2025-03-02 03:03:52 +00:00

37 lines
1.7 KiB
JSON

{
"id": "CVE-2022-49454",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-02-26T07:01:21.767",
"lastModified": "2025-02-26T07:01:21.767",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nPCI: mediatek: Fix refcount leak in mtk_pcie_subsys_powerup()\n\nThe of_find_compatible_node() function returns a node pointer with\nrefcount incremented, We should use of_node_put() on it when done\nAdd the missing of_node_put() to release the refcount."
},
{
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: PCI: mediatek: Se corrige la p\u00e9rdida de recuento de referencias en mtk_pcie_subsys_powerup() La funci\u00f3n of_find_compatible_node() devuelve un puntero de nodo con el recuento de referencias incrementado. Deber\u00edamos usar of_node_put() en \u00e9l cuando termine. Agregue el of_node_put() faltante para liberar el recuento de referencias."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/09b2d906d78ddf5042b1f3e0091835fc6997e8a4",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/214e0d8fe4a813ae6ffd62bc2dfe7544c20914f4",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/4cef4237d6c37257cb6ddc397723e9c0dded0efe",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/ad1c9d13e04509ae24fae8dd2897148657323519",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}