CVE-2022-48778

In the Linux kernel, the following vulnerability has been resolved: mtd: rawnand: gpmi: don't leak PM reference in error path If gpmi_nfc_apply_timings() fails, the PM runtime usage counter must be dropped.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:34

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/4a7ec50298b1127c5024a750c969ea0794899545 - Mailing List, Patch () https://git.kernel.org/stable/c/4a7ec50298b1127c5024a750c969ea0794899545 - Mailing List, Patch
References () https://git.kernel.org/stable/c/4cd3281a910a5adf73b2a0a82241dd67844d0b25 - Mailing List, Patch () https://git.kernel.org/stable/c/4cd3281a910a5adf73b2a0a82241dd67844d0b25 - Mailing List, Patch
References () https://git.kernel.org/stable/c/58d3111eafce9e4398654b07f0b1dac27f26ee5b - Mailing List, Patch () https://git.kernel.org/stable/c/58d3111eafce9e4398654b07f0b1dac27f26ee5b - Mailing List, Patch
References () https://git.kernel.org/stable/c/9161f365c91614e5a3f5c6dcc44c3b1b33bc59c0 - Mailing List, Patch () https://git.kernel.org/stable/c/9161f365c91614e5a3f5c6dcc44c3b1b33bc59c0 - Mailing List, Patch
References () https://git.kernel.org/stable/c/a4eeeaca50199e3f19eb13ac3b7e0bbb93e22de4 - Mailing List, Patch () https://git.kernel.org/stable/c/a4eeeaca50199e3f19eb13ac3b7e0bbb93e22de4 - Mailing List, Patch

21 Aug 2024, 17:59

Type Values Removed Values Added
CWE NVD-CWE-Other
First Time Linux linux Kernel
Linux
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: mtd: rawnand: gpmi: no filtrar la referencia de PM en la ruta de error Si gpmi_nfc_apply_timings() falla, se debe descartar el contador de uso del tiempo de ejecución de PM.
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
References () https://git.kernel.org/stable/c/4a7ec50298b1127c5024a750c969ea0794899545 - () https://git.kernel.org/stable/c/4a7ec50298b1127c5024a750c969ea0794899545 - Mailing List, Patch
References () https://git.kernel.org/stable/c/4cd3281a910a5adf73b2a0a82241dd67844d0b25 - () https://git.kernel.org/stable/c/4cd3281a910a5adf73b2a0a82241dd67844d0b25 - Mailing List, Patch
References () https://git.kernel.org/stable/c/58d3111eafce9e4398654b07f0b1dac27f26ee5b - () https://git.kernel.org/stable/c/58d3111eafce9e4398654b07f0b1dac27f26ee5b - Mailing List, Patch
References () https://git.kernel.org/stable/c/9161f365c91614e5a3f5c6dcc44c3b1b33bc59c0 - () https://git.kernel.org/stable/c/9161f365c91614e5a3f5c6dcc44c3b1b33bc59c0 - Mailing List, Patch
References () https://git.kernel.org/stable/c/a4eeeaca50199e3f19eb13ac3b7e0bbb93e22de4 - () https://git.kernel.org/stable/c/a4eeeaca50199e3f19eb13ac3b7e0bbb93e22de4 - Mailing List, Patch
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

16 Jul 2024, 12:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-16 12:15

Updated : 2024-11-21 07:34


NVD link : CVE-2022-48778

Mitre link : CVE-2022-48778

CVE.ORG link : CVE-2022-48778


JSON object : View

Products Affected

linux

  • linux_kernel