vulnerability
Ubuntu: (CVE-2022-49719): linux vulnerability
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
6 | (AV:L/AC:L/Au:S/C:C/I:N/A:C) | Feb 26, 2025 | Mar 3, 2025 | Jun 12, 2025 |
Severity
6
CVSS
(AV:L/AC:L/Au:S/C:C/I:N/A:C)
Published
Feb 26, 2025
Added
Mar 3, 2025
Modified
Jun 12, 2025
Description
In the Linux kernel, the following vulnerability has been resolved:
irqchip/gic/realview: Fix refcount leak in realview_gic_of_init
of_find_matching_node_and_match() returns a node pointer with refcount
incremented, we should use of_node_put() on it when not need anymore.
Add missing of_node_put() to avoid refcount leak.
Solution(s)
ubuntu-upgrade-linuxubuntu-upgrade-linux-awsubuntu-upgrade-linux-aws-5-15ubuntu-upgrade-linux-aws-5-4ubuntu-upgrade-linux-aws-fipsubuntu-upgrade-linux-aws-hweubuntu-upgrade-linux-azureubuntu-upgrade-linux-azure-4-15ubuntu-upgrade-linux-azure-5-15ubuntu-upgrade-linux-azure-5-4ubuntu-upgrade-linux-azure-fipsubuntu-upgrade-linux-bluefieldubuntu-upgrade-linux-fipsubuntu-upgrade-linux-gcpubuntu-upgrade-linux-gcp-4-15ubuntu-upgrade-linux-gcp-5-15ubuntu-upgrade-linux-gcp-5-4ubuntu-upgrade-linux-gcp-fipsubuntu-upgrade-linux-gkeubuntu-upgrade-linux-gkeopubuntu-upgrade-linux-hweubuntu-upgrade-linux-hwe-5-15ubuntu-upgrade-linux-hwe-5-4ubuntu-upgrade-linux-ibmubuntu-upgrade-linux-ibm-5-4ubuntu-upgrade-linux-intel-iotgubuntu-upgrade-linux-intel-iotg-5-15ubuntu-upgrade-linux-iotubuntu-upgrade-linux-kvmubuntu-upgrade-linux-lowlatencyubuntu-upgrade-linux-lowlatency-hwe-5-15ubuntu-upgrade-linux-nvidiaubuntu-upgrade-linux-oracleubuntu-upgrade-linux-oracle-5-15ubuntu-upgrade-linux-oracle-5-4ubuntu-upgrade-linux-raspiubuntu-upgrade-linux-raspi-5-4ubuntu-upgrade-linux-realtimeubuntu-upgrade-linux-riscv-5-15
References
- CVE-2022-49719
- https://attackerkb.com/topics/CVE-2022-49719
- URL-https://git.kernel.org/linus/f4b98e314888cc51486421bcf6d52852452ea48b
- URL-https://git.kernel.org/stable/c/16b603cb8d34c2d917983918db1f88c8b831baaa
- URL-https://git.kernel.org/stable/c/486f68f85085d9b16ae097679b1486dcb1b6eb69
- URL-https://git.kernel.org/stable/c/56526c3883fc7a1f5898b1d40a02c8b8685a5d92
- URL-https://git.kernel.org/stable/c/5d38720661a4b9c87705c206a6081177ffb8ec1d
- URL-https://git.kernel.org/stable/c/87da903ce632d5689bef66d56ee5dae700d82104
- URL-https://git.kernel.org/stable/c/b634af84bc1edece4e63317b0ad95618dd3a8693
- URL-https://git.kernel.org/stable/c/e52a58b79f11755ea7e877015c4a1704303fa55f
- URL-https://git.kernel.org/stable/c/f4b98e314888cc51486421bcf6d52852452ea48b
- URL-https://www.cve.org/CVERecord?id=CVE-2022-49719

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.