First published: Wed Feb 26 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: irqchip/gic-v3: Fix refcount leak in gic_populate_ppi_partitions of_find_node_by_phandle() returns a node pointer with refcount incremented, we should use of_node_put() on it when not need anymore. Add missing of_node_put() to avoid refcount leak.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | ||
Linux Kernel | >=4.7<4.19.249 | |
Linux Kernel | >=4.20<5.4.200 | |
Linux Kernel | >=5.5<5.10.124 | |
Linux Kernel | >=5.11<5.15.49 | |
Linux Kernel | >=5.16<5.18.6 | |
Linux Kernel | =5.19-rc1 | |
Linux Kernel | =5.19-rc2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-49715 is categorized as medium severity due to a refcount leak in the GICv3 IRQ chip handling.
To fix CVE-2022-49715, update the Linux kernel to a version that incorporates the patch addressing the refcount leak.
CVE-2022-49715 affects multiple versions of the Linux kernel prior to the patch that resolves the refcount leak.
Any system running an affected version of the Linux kernel utilizing the GICv3 IRQ chip can be impacted by CVE-2022-49715.
CVE-2022-49715 can potentially be exploited in certain conditions, leading to memory management issues.