Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2022-49609

Summary
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
Published At-26 Feb, 2025 | 02:23
Updated At-01 Oct, 2025 | 19:36
Rejected At-
Credits

power/reset: arm-versatile: Fix refcount leak in versatile_reboot_probe

In the Linux kernel, the following vulnerability has been resolved: power/reset: arm-versatile: Fix refcount leak in versatile_reboot_probe of_find_matching_node_and_match() returns a node pointer with refcount incremented, we should use of_node_put() on it when not need anymore. Add missing of_node_put() to avoid refcount leak.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:Linux
Assigner Org ID:416baaa9-dc9f-4396-8d5f-8c081fb06d67
Published At:26 Feb, 2025 | 02:23
Updated At:01 Oct, 2025 | 19:36
Rejected At:
▼CVE Numbering Authority (CNA)
power/reset: arm-versatile: Fix refcount leak in versatile_reboot_probe

In the Linux kernel, the following vulnerability has been resolved: power/reset: arm-versatile: Fix refcount leak in versatile_reboot_probe of_find_matching_node_and_match() returns a node pointer with refcount incremented, we should use of_node_put() on it when not need anymore. Add missing of_node_put() to avoid refcount leak.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/power/reset/arm-versatile-reboot.c
Default Status
unaffected
Versions
Affected
  • From 0e545f57b708630c54c8c5c24ea7f7034f6c40d9 before b4d224eec96a18fa8959512cd9e5b6a50bd16a41 (git)
  • From 0e545f57b708630c54c8c5c24ea7f7034f6c40d9 before a9ed3ad3a8d1dfbc829d86edb3236873a315db11 (git)
  • From 0e545f57b708630c54c8c5c24ea7f7034f6c40d9 before 6689754b121bd487f99680280102b3a5cd7374af (git)
  • From 0e545f57b708630c54c8c5c24ea7f7034f6c40d9 before 78bdf732cf5d74d1c6ecda06830a91f80a4aef6f (git)
  • From 0e545f57b708630c54c8c5c24ea7f7034f6c40d9 before 493ceca3271316e74639c89ff8ac35883de64256 (git)
  • From 0e545f57b708630c54c8c5c24ea7f7034f6c40d9 before 71ab83ac65e2d671552374123bf920c1d698335a (git)
  • From 0e545f57b708630c54c8c5c24ea7f7034f6c40d9 before 49fa778ee044b00471dd9ccae5f6a121fffea1ac (git)
  • From 0e545f57b708630c54c8c5c24ea7f7034f6c40d9 before 80192eff64eee9b3bc0594a47381937b94b9d65a (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/power/reset/arm-versatile-reboot.c
Default Status
affected
Versions
Affected
  • 3.18
Unaffected
  • From 0 before 3.18 (semver)
  • From 4.9.325 through 4.9.* (semver)
  • From 4.14.290 through 4.14.* (semver)
  • From 4.19.254 through 4.19.* (semver)
  • From 5.4.208 through 5.4.* (semver)
  • From 5.10.134 through 5.10.* (semver)
  • From 5.15.58 through 5.15.* (semver)
  • From 5.18.15 through 5.18.* (semver)
  • From 5.19 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/b4d224eec96a18fa8959512cd9e5b6a50bd16a41
N/A
https://git.kernel.org/stable/c/a9ed3ad3a8d1dfbc829d86edb3236873a315db11
N/A
https://git.kernel.org/stable/c/6689754b121bd487f99680280102b3a5cd7374af
N/A
https://git.kernel.org/stable/c/78bdf732cf5d74d1c6ecda06830a91f80a4aef6f
N/A
https://git.kernel.org/stable/c/493ceca3271316e74639c89ff8ac35883de64256
N/A
https://git.kernel.org/stable/c/71ab83ac65e2d671552374123bf920c1d698335a
N/A
https://git.kernel.org/stable/c/49fa778ee044b00471dd9ccae5f6a121fffea1ac
N/A
https://git.kernel.org/stable/c/80192eff64eee9b3bc0594a47381937b94b9d65a
N/A
Hyperlink: https://git.kernel.org/stable/c/b4d224eec96a18fa8959512cd9e5b6a50bd16a41
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/a9ed3ad3a8d1dfbc829d86edb3236873a315db11
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/6689754b121bd487f99680280102b3a5cd7374af
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/78bdf732cf5d74d1c6ecda06830a91f80a4aef6f
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/493ceca3271316e74639c89ff8ac35883de64256
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/71ab83ac65e2d671552374123bf920c1d698335a
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/49fa778ee044b00471dd9ccae5f6a121fffea1ac
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/80192eff64eee9b3bc0594a47381937b94b9d65a
Resource: N/A
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Problem Types
TypeCWE IDDescription
CWECWE-noinfoCWE-noinfo Not enough information
Type: CWE
CWE ID: CWE-noinfo
Description: CWE-noinfo Not enough information
Metrics
VersionBase scoreBase severityVector
3.15.5MEDIUM
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Version: 3.1
Base score: 5.5
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:416baaa9-dc9f-4396-8d5f-8c081fb06d67
Published At:26 Feb, 2025 | 07:01
Updated At:01 Oct, 2025 | 20:16

In the Linux kernel, the following vulnerability has been resolved: power/reset: arm-versatile: Fix refcount leak in versatile_reboot_probe of_find_matching_node_and_match() returns a node pointer with refcount incremented, we should use of_node_put() on it when not need anymore. Add missing of_node_put() to avoid refcount leak.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.15.5MEDIUM
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Secondary3.15.5MEDIUM
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Type: Primary
Version: 3.1
Base score: 5.5
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Type: Secondary
Version: 3.1
Base score: 5.5
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CPE Matches

Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 3.18(inclusive) to 4.9.325(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 4.10(inclusive) to 4.14.290(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 4.15(inclusive) to 4.19.254(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 4.20(inclusive) to 5.4.208(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 5.5(inclusive) to 5.10.134(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 5.11(inclusive) to 5.15.58(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 5.16(inclusive) to 5.18.15(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>5.19
cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>5.19
cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>5.19
cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>5.19
cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>5.19
cpe:2.3:o:linux:linux_kernel:5.19:rc5:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>5.19
cpe:2.3:o:linux:linux_kernel:5.19:rc6:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
NVD-CWE-OtherPrimarynvd@nist.gov
CWE ID: NVD-CWE-Other
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://git.kernel.org/stable/c/493ceca3271316e74639c89ff8ac35883de64256416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/49fa778ee044b00471dd9ccae5f6a121fffea1ac416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/6689754b121bd487f99680280102b3a5cd7374af416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/71ab83ac65e2d671552374123bf920c1d698335a416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/78bdf732cf5d74d1c6ecda06830a91f80a4aef6f416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/80192eff64eee9b3bc0594a47381937b94b9d65a416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/a9ed3ad3a8d1dfbc829d86edb3236873a315db11416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/b4d224eec96a18fa8959512cd9e5b6a50bd16a41416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
Hyperlink: https://git.kernel.org/stable/c/493ceca3271316e74639c89ff8ac35883de64256
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/49fa778ee044b00471dd9ccae5f6a121fffea1ac
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/6689754b121bd487f99680280102b3a5cd7374af
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/71ab83ac65e2d671552374123bf920c1d698335a
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/78bdf732cf5d74d1c6ecda06830a91f80a4aef6f
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/80192eff64eee9b3bc0594a47381937b94b9d65a
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/a9ed3ad3a8d1dfbc829d86edb3236873a315db11
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/b4d224eec96a18fa8959512cd9e5b6a50bd16a41
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch

Change History

0
Information is not available yet

Similar CVEs

0Records found

Details not found