Vulnerability Details : CVE-2022-49439
In the Linux kernel, the following vulnerability has been resolved:
powerpc/fsl_rio: Fix refcount leak in fsl_rio_setup
of_parse_phandle() returns a node pointer with refcount
incremented, we should use of_node_put() on it when not need anymore.
Add missing of_node_put() to avoid refcount leak.
Products affected by CVE-2022-49439
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-49439
0.02%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 4 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-49439
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.5
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
1.8
|
3.6
|
NIST | 2025-03-17 |
References for CVE-2022-49439
-
https://git.kernel.org/stable/c/c70dd353d37158e06bf8d450d4b31a7091609924
Patch
-
https://git.kernel.org/stable/c/46fd994763cf6884b88a2da712af918f3ed54d7b
Patch
-
https://git.kernel.org/stable/c/5607a77a365df8c0fd5ff43ac424812b95775527
Patch
-
https://git.kernel.org/stable/c/fcee96924ba1596ca80a6770b2567ca546f9a482
Patch
-
https://git.kernel.org/stable/c/5b8aa2ba38c010f47c965dd9bb5a8561813ed649
Patch
-
https://git.kernel.org/stable/c/7b668a59ddfb32727e39b06fdf52b28e58c684e0
Patch
-
https://git.kernel.org/stable/c/51e25fbf20c9152d84a34b7afac15a41fe5c9116
Patch
-
https://git.kernel.org/stable/c/bcb6c4c5eb4836a21411dfe8247bf9951eb6e7c3
Patch
Jump to