U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2022-49185 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: pinctrl: nomadik: Add missing of_node_put() in nmk_pinctrl_probe This node pointer is returned by of_parse_phandle() with refcount incremented in this function. Calling of_node_put() to avoid the refcount leak.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

URL Source(s) Tag(s)
https://git.kernel.org/stable/c/0067ba448f1c29ca06e5aee00d8506889ed1f9d0 kernel.org Patch 
https://git.kernel.org/stable/c/0356d4b64a03d23daf99a2a29d7d7d91d6ec2ea8 kernel.org Patch 
https://git.kernel.org/stable/c/59250d547542f1c7765a78dc97ddfe5e6b0d2ab0 kernel.org Patch 
https://git.kernel.org/stable/c/62580a40c9bef3d8a90629c64dda381344b35ffd kernel.org Patch 
https://git.kernel.org/stable/c/669b05ff43bd7ed684379c6e2006a6dad5127b71 kernel.org Patch 
https://git.kernel.org/stable/c/9511c6018cd772668def8b034bc67269847e591a kernel.org Patch 
https://git.kernel.org/stable/c/bc1e29a35147c1ba6ea2b06a16cb0028f7c852d2 kernel.org Patch 
https://git.kernel.org/stable/c/c09ac191b1f97cfa06f394dbfd7a5db07986cefc kernel.org Patch 
https://git.kernel.org/stable/c/c52703355766c347f270df222a744e0c491a02f2 kernel.org Patch 

Weakness Enumeration

CWE-ID CWE Name Source
NVD-CWE-Other Other cwe source acceptance level NIST  

Known Affected Software Configurations Switch to CPE 2.2

CPEs loading, please wait.

Denotes Vulnerable Software
Are we missing a CPE here? Please let us know.

Change History

2 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2022-49185
NVD Published Date:
02/26/2025
NVD Last Modified:
03/17/2025
Source:
kernel.org