{ "id": "CVE-2022-49454", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:21.767", "lastModified": "2025-02-26T07:01:21.767", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nPCI: mediatek: Fix refcount leak in mtk_pcie_subsys_powerup()\n\nThe of_find_compatible_node() function returns a node pointer with\nrefcount incremented, We should use of_node_put() on it when done\nAdd the missing of_node_put() to release the refcount." }, { "lang": "es", "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: PCI: mediatek: Se corrige la p\u00e9rdida de recuento de referencias en mtk_pcie_subsys_powerup() La funci\u00f3n of_find_compatible_node() devuelve un puntero de nodo con el recuento de referencias incrementado. Deber\u00edamos usar of_node_put() en \u00e9l cuando termine. Agregue el of_node_put() faltante para liberar el recuento de referencias." } ], "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/09b2d906d78ddf5042b1f3e0091835fc6997e8a4", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" }, { "url": "https://git.kernel.org/stable/c/214e0d8fe4a813ae6ffd62bc2dfe7544c20914f4", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" }, { "url": "https://git.kernel.org/stable/c/4cef4237d6c37257cb6ddc397723e9c0dded0efe", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" }, { "url": "https://git.kernel.org/stable/c/ad1c9d13e04509ae24fae8dd2897148657323519", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] }