In the Linux kernel, the following vulnerability has been resolved:
char: xillybus: fix a refcount leak in cleanup_dev()
usbgetdev is called in xillyusbprobe. So it is better to call usbput_dev before xdev is released.
{
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49310.json",
"cna_assigner": "Linux"
}"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49310.json"
[
{
"signature_type": "Line",
"digest": {
"line_hashes": [
"240292438291876432005567869559561130636",
"63334059489126623317274355122553607902",
"277154291820279558003767485340407837776"
],
"threshold": 0.9
},
"deprecated": false,
"id": "CVE-2022-49310-168e4f4f",
"target": {
"file": "drivers/char/xillybus/xillyusb.c"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e277b95acdab84cd5d2f8d537a37aef6d21e988b"
},
{
"signature_type": "Function",
"digest": {
"function_hash": "92704978330297074235328908246052576719",
"length": 331.0
},
"deprecated": false,
"id": "CVE-2022-49310-193ab775",
"target": {
"function": "cleanup_dev",
"file": "drivers/char/xillybus/xillyusb.c"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e277b95acdab84cd5d2f8d537a37aef6d21e988b"
},
{
"signature_type": "Function",
"digest": {
"function_hash": "92704978330297074235328908246052576719",
"length": 331.0
},
"deprecated": false,
"id": "CVE-2022-49310-24d2b63b",
"target": {
"function": "cleanup_dev",
"file": "drivers/char/xillybus/xillyusb.c"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@21f1f167d727f3f857e26d509ef5a6d47fd31bc3"
},
{
"signature_type": "Function",
"digest": {
"function_hash": "92704978330297074235328908246052576719",
"length": 331.0
},
"deprecated": false,
"id": "CVE-2022-49310-31f51d51",
"target": {
"function": "cleanup_dev",
"file": "drivers/char/xillybus/xillyusb.c"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@bc8fceda3b89006e8a7dda8a097d36045d044c25"
},
{
"signature_type": "Line",
"digest": {
"line_hashes": [
"240292438291876432005567869559561130636",
"63334059489126623317274355122553607902",
"277154291820279558003767485340407837776"
],
"threshold": 0.9
},
"deprecated": false,
"id": "CVE-2022-49310-494337b6",
"target": {
"file": "drivers/char/xillybus/xillyusb.c"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@bc8fceda3b89006e8a7dda8a097d36045d044c25"
},
{
"signature_type": "Line",
"digest": {
"line_hashes": [
"240292438291876432005567869559561130636",
"63334059489126623317274355122553607902",
"277154291820279558003767485340407837776"
],
"threshold": 0.9
},
"deprecated": false,
"id": "CVE-2022-49310-782b163a",
"target": {
"file": "drivers/char/xillybus/xillyusb.c"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b67d19662fdee275c479d21853bc1239600a798f"
},
{
"signature_type": "Line",
"digest": {
"line_hashes": [
"240292438291876432005567869559561130636",
"63334059489126623317274355122553607902",
"277154291820279558003767485340407837776"
],
"threshold": 0.9
},
"deprecated": false,
"id": "CVE-2022-49310-8efeef1b",
"target": {
"file": "drivers/char/xillybus/xillyusb.c"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@21f1f167d727f3f857e26d509ef5a6d47fd31bc3"
},
{
"signature_type": "Function",
"digest": {
"function_hash": "92704978330297074235328908246052576719",
"length": 331.0
},
"deprecated": false,
"id": "CVE-2022-49310-e1ea5dfc",
"target": {
"function": "cleanup_dev",
"file": "drivers/char/xillybus/xillyusb.c"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b67d19662fdee275c479d21853bc1239600a798f"
}
]