In the Linux kernel, the following vulnerability has been resolved:
gpio/rockchip: fix refcount leak in rockchip_gpiolib_register()
The node returned by of_get_parent() with refcount incremented,
of_node_put() needs be called when finish using it. So add it in the
end of of_pinctrl_get().
References
Configurations
Configuration 1 (hide)
|
History
25 Oct 2024, 20:06
Type | Values Removed | Values Added |
---|---|---|
First Time |
Linux linux Kernel
Linux |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
CPE | cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.1:rc7:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.1:rc6:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.1:rc8:*:*:*:*:*:* |
|
References | () https://git.kernel.org/stable/c/033c79b7ee8a7bf1c1a13ac3addc91184425cbae - Patch | |
References | () https://git.kernel.org/stable/c/5cb8f1a784fd6115be58282fe15105572319d8be - Patch | |
References | () https://git.kernel.org/stable/c/63ff545af73f759d1bd04198af8ed8577fb739fc - Patch | |
CWE | NVD-CWE-Other |
23 Oct 2024, 15:13
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
21 Oct 2024, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-10-21 20:15
Updated : 2024-10-25 20:06
NVD link : CVE-2022-48965
Mitre link : CVE-2022-48965
CVE.ORG link : CVE-2022-48965
JSON object : View
Products Affected
linux
- linux_kernel
CWE