U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2022-49324 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: mips: cpc: Fix refcount leak in mips_cpc_default_phys_base Add the missing of_node_put() to release the refcount incremented by of_find_compatible_node().


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource
https://git.kernel.org/stable/c/1699ec1bfb59304a788901474f6bb003f7831b61 Patch 
https://git.kernel.org/stable/c/4107fa700f314592850e2c64608f6ede4c077476 Patch 
https://git.kernel.org/stable/c/8f843cdfc202caaa5d67db3395d893e56362e43a Patch 
https://git.kernel.org/stable/c/961ee8a6eeef4632a215d995d837b204f8c7c2d4 Patch 
https://git.kernel.org/stable/c/aae6b4bb63c694bc91714412718f15468407fe51 Patch 
https://git.kernel.org/stable/c/bed702566dcdb6ebe300bc0c62bf3600cf4d5874 Patch 
https://git.kernel.org/stable/c/c667b3872a4c435a3f29d4e15971cd8c378b0043 Patch 
https://git.kernel.org/stable/c/cc0aed22d33ced9e266c50bdf1cbe668c5acfdf8 Patch 

Weakness Enumeration

CWE-ID CWE Name Source
NVD-CWE-Other Other cwe source acceptance level NIST  

Known Affected Software Configurations Switch to CPE 2.2

CPEs loading, please wait.

Denotes Vulnerable Software
Are we missing a CPE here? Please let us know.

Change History

2 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2022-49324
NVD Published Date:
02/26/2025
NVD Last Modified:
03/13/2025
Source:
kernel.org