U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2022-49821 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: mISDN: fix possible memory leak in mISDN_dsp_element_register() Afer commit 1fa5ae857bb1 ("driver core: get rid of struct device's bus_id string array"), the name of device is allocated dynamically, use put_device() to give up the reference, so that the name can be freed in kobject_cleanup() when the refcount is 0. The 'entry' is going to be freed in mISDN_dsp_dev_release(), so the kfree() is removed. list_del() is called in mISDN_dsp_dev_release(), so it need be initialized.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

URL Source(s) Tag(s)
https://git.kernel.org/stable/c/083a2c9ef82e184bdf0b9f9a1e5fc38d32afbb47 kernel.org
https://git.kernel.org/stable/c/0f2c681900a01e3f23789bca26d88268c3d5b51d kernel.org
https://git.kernel.org/stable/c/727ed7d28348c026c7ef4d852f3d0e5054d376e8 kernel.org
https://git.kernel.org/stable/c/7a05e3929668c8cfef495c69752a9e91fac4878f kernel.org
https://git.kernel.org/stable/c/98a2ac1ca8fd6eca6867726fe238d06e75eb1acd kernel.org
https://git.kernel.org/stable/c/b119bedbefb7dd9ed8bf8cb9f1056504250d610e kernel.org
https://git.kernel.org/stable/c/bbd53d05c4c892080ef3b617eff4f57903acecb9 kernel.org
https://git.kernel.org/stable/c/d4b8394725079670be309f9a35ad88a8cbbaaefd kernel.org

Weakness Enumeration

CWE-ID CWE Name Source

Change History

1 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2022-49821
NVD Published Date:
05/01/2025
NVD Last Modified:
05/02/2025
Source:
kernel.org