2025-02-26 19:03:52 +00:00
{
"id" : "CVE-2022-49712" ,
"sourceIdentifier" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67" ,
"published" : "2025-02-26T07:01:46.987" ,
2025-03-11 23:03:49 +00:00
"lastModified" : "2025-03-11T21:58:07.837" ,
"vulnStatus" : "Analyzed" ,
2025-02-26 19:03:52 +00:00
"cveTags" : [ ] ,
"descriptions" : [
{
"lang" : "en" ,
"value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: gadget: lpc32xx_udc: Fix refcount leak in lpc32xx_udc_probe\n\nof_parse_phandle() returns a node pointer with refcount\nincremented, we should use of_node_put() on it when not need anymore.\nAdd missing of_node_put() to avoid refcount leak.\nof_node_put() will check NULL pointer."
2025-03-02 03:03:52 +00:00
} ,
{
"lang" : "es" ,
"value" : "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: usb: gadget: lpc32xx_udc: Se corrige la p\u00e9rdida de recuento de referencias en lpc32xx_udc_probe of_parse_phandle() devuelve un puntero de nodo con el recuento de referencias incrementado, deber\u00edamos usar of_node_put() en \u00e9l cuando ya no lo necesitemos. Agregue of_node_put() faltante para evitar la p\u00e9rdida de recuento de referencias. of_node_put() verificar\u00e1 el puntero NULL."
2025-02-26 19:03:52 +00:00
}
] ,
2025-03-11 23:03:49 +00:00
"metrics" : {
"cvssMetricV31" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" ,
"baseScore" : 5.5 ,
"baseSeverity" : "MEDIUM" ,
"attackVector" : "LOCAL" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
"availabilityImpact" : "HIGH"
} ,
"exploitabilityScore" : 1.8 ,
"impactScore" : 3.6
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "NVD-CWE-Other"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "3.5" ,
"versionEndExcluding" : "4.9.320" ,
"matchCriteriaId" : "FEC46686-BCE1-40AE-B7B6-D3622B692592"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "4.10" ,
"versionEndExcluding" : "4.14.285" ,
"matchCriteriaId" : "6D4E7BA7-6B66-4B9A-991A-AD516DADF77D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "4.15" ,
"versionEndExcluding" : "4.19.249" ,
"matchCriteriaId" : "8A08E48B-CA77-4A21-9558-17D61C146BE9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "4.20" ,
"versionEndExcluding" : "5.4.200" ,
"matchCriteriaId" : "80B2AE57-4A7E-40BB-8C83-33D4436CE199"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "5.5" ,
"versionEndExcluding" : "5.10.124" ,
"matchCriteriaId" : "6442F2CD-FF1C-4574-9948-138835E635D7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "5.11" ,
"versionEndExcluding" : "5.15.49" ,
"matchCriteriaId" : "697D250E-E0A4-41BE-BB54-96385E129206"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "5.16" ,
"versionEndExcluding" : "5.18.6" ,
"matchCriteriaId" : "CDD33A19-B51E-4090-A47B-073098916815"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*" ,
"matchCriteriaId" : "A8C30C2D-F82D-4D37-AB48-D76ABFBD5377"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*" ,
"matchCriteriaId" : "BF8547FC-C849-4F1B-804B-A93AE2F04A92"
}
]
}
]
}
] ,
2025-02-26 19:03:52 +00:00
"references" : [
{
"url" : "https://git.kernel.org/stable/c/0ef6917c0524da5b88496b9706628ffef108b9bb" ,
2025-03-11 23:03:49 +00:00
"source" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67" ,
"tags" : [
"Patch"
]
2025-02-26 19:03:52 +00:00
} ,
{
"url" : "https://git.kernel.org/stable/c/2a598da14856ead80c726b38ba426c68637d9211" ,
2025-03-11 23:03:49 +00:00
"source" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67" ,
"tags" : [
"Patch"
]
2025-02-26 19:03:52 +00:00
} ,
{
"url" : "https://git.kernel.org/stable/c/46da1e4a8b6329479433b2a4056941dfdd7f3efd" ,
2025-03-11 23:03:49 +00:00
"source" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67" ,
"tags" : [
"Patch"
]
2025-02-26 19:03:52 +00:00
} ,
{
"url" : "https://git.kernel.org/stable/c/4757c9ade34178b351580133771f510b5ffcf9c8" ,
2025-03-11 23:03:49 +00:00
"source" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67" ,
"tags" : [
"Patch"
]
2025-02-26 19:03:52 +00:00
} ,
{
"url" : "https://git.kernel.org/stable/c/57901c658f77d9ea2e772f35cb38e47efb54c558" ,
2025-03-11 23:03:49 +00:00
"source" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67" ,
"tags" : [
"Patch"
]
2025-02-26 19:03:52 +00:00
} ,
{
"url" : "https://git.kernel.org/stable/c/727c82d003e0ec64411fd1257a9a57de4ad7a99a" ,
2025-03-11 23:03:49 +00:00
"source" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67" ,
"tags" : [
"Patch"
]
2025-02-26 19:03:52 +00:00
} ,
{
"url" : "https://git.kernel.org/stable/c/b75bddfcc18170ce8e3fb695a76ec2dec4ce0ea5" ,
2025-03-11 23:03:49 +00:00
"source" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67" ,
"tags" : [
"Patch"
]
2025-02-26 19:03:52 +00:00
} ,
{
"url" : "https://git.kernel.org/stable/c/d85e4e6284a91aa2d1ab004e9d84b9c09b4aa203" ,
2025-03-11 23:03:49 +00:00
"source" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67" ,
"tags" : [
"Patch"
]
2025-02-26 19:03:52 +00:00
}
]
}