We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2022-49821

mISDN: fix possible memory leak in mISDN_dsp_element_register()



Description

In the Linux kernel, the following vulnerability has been resolved: mISDN: fix possible memory leak in mISDN_dsp_element_register() Afer commit 1fa5ae857bb1 ("driver core: get rid of struct device's bus_id string array"), the name of device is allocated dynamically, use put_device() to give up the reference, so that the name can be freed in kobject_cleanup() when the refcount is 0. The 'entry' is going to be freed in mISDN_dsp_dev_release(), so the kfree() is removed. list_del() is called in mISDN_dsp_dev_release(), so it need be initialized.

Reserved 2025-05-01 | Published 2025-05-01 | Updated 2025-05-04 | Assigner Linux

Product status

Default status
unaffected

1fa5ae857bb14f6046205171d98506d8112dd74e before bbd53d05c4c892080ef3b617eff4f57903acecb9
affected

1fa5ae857bb14f6046205171d98506d8112dd74e before b119bedbefb7dd9ed8bf8cb9f1056504250d610e
affected

1fa5ae857bb14f6046205171d98506d8112dd74e before 727ed7d28348c026c7ef4d852f3d0e5054d376e8
affected

1fa5ae857bb14f6046205171d98506d8112dd74e before 0f2c681900a01e3f23789bca26d88268c3d5b51d
affected

1fa5ae857bb14f6046205171d98506d8112dd74e before 083a2c9ef82e184bdf0b9f9a1e5fc38d32afbb47
affected

1fa5ae857bb14f6046205171d98506d8112dd74e before 7a05e3929668c8cfef495c69752a9e91fac4878f
affected

1fa5ae857bb14f6046205171d98506d8112dd74e before d4b8394725079670be309f9a35ad88a8cbbaaefd
affected

1fa5ae857bb14f6046205171d98506d8112dd74e before 98a2ac1ca8fd6eca6867726fe238d06e75eb1acd
affected

Default status
affected

2.6.30
affected

Any version before 2.6.30
unaffected

4.9.334
unaffected

4.14.300
unaffected

4.19.267
unaffected

5.4.225
unaffected

5.10.156
unaffected

5.15.80
unaffected

6.0.10
unaffected

6.1
unaffected

References

git.kernel.org/...c/bbd53d05c4c892080ef3b617eff4f57903acecb9

git.kernel.org/...c/b119bedbefb7dd9ed8bf8cb9f1056504250d610e

git.kernel.org/...c/727ed7d28348c026c7ef4d852f3d0e5054d376e8

git.kernel.org/...c/0f2c681900a01e3f23789bca26d88268c3d5b51d

git.kernel.org/...c/083a2c9ef82e184bdf0b9f9a1e5fc38d32afbb47

git.kernel.org/...c/7a05e3929668c8cfef495c69752a9e91fac4878f

git.kernel.org/...c/d4b8394725079670be309f9a35ad88a8cbbaaefd

git.kernel.org/...c/98a2ac1ca8fd6eca6867726fe238d06e75eb1acd

cve.org (CVE-2022-49821)

nvd.nist.gov (CVE-2022-49821)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2022-49821

Support options

Helpdesk Chat, Email, Knowledgebase