41 lines
2.0 KiB
JSON
Raw Normal View History

{
"id": "CVE-2022-49716",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-02-26T07:01:47.350",
"lastModified": "2025-02-26T07:01:47.350",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nirqchip/gic-v3: Fix error handling in gic_populate_ppi_partitions\n\nof_get_child_by_name() returns a node pointer with refcount\nincremented, we should use of_node_put() on it when not need anymore.\nWhen kcalloc fails, it missing of_node_put() and results in refcount\nleak. Fix this by goto out_put_node label."
},
{
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: irqchip/gic-v3: Se ha corregido el error de gesti\u00f3n en gic_populate_ppi_partitions. of_get_child_by_name() devuelve un puntero de nodo con refcount incrementado. Deber\u00edamos usar of_node_put() en \u00e9l cuando ya no lo necesitemos. Cuando kcalloc falla, falta of_node_put() y da como resultado una fuga de refcount. Corrija esto pasando a la etiqueta out_put_node."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/0b325d993995a321f6ab4e6c51f0504ec092bf5b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/58e67c81e229351027d28c610638378606e33a08",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/7c9dd9d23f26dabcfb14148b9acdfba540418b19",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/c83c34c57798fc41faefcf078be78683db2f4beb",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/ec8401a429ffee34ccf38cebf3443f8d5ae6cb0d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}