CVE-2022-49399

Source
https://cve.org/CVERecord?id=CVE-2022-49399
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49399.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49399
Downstream
Related
Published
2025-02-26T02:12:27.650Z
Modified
2026-03-12T03:25:12.761801Z
Summary
tty: goldfish: Use tty_port_destroy() to destroy port
Details

In the Linux kernel, the following vulnerability has been resolved:

tty: goldfish: Use ttyportdestroy() to destroy port

In goldfishttyprobe(), the port initialized through ttyportinit() should be destroyed in error paths.In goldfishttyremove(), qtty->port also should be destroyed or else might leak resources.

Fix the above by calling ttyportdestroy().

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49399.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
666b7793d4bfa9f150b5c2007ab48c755ddc53ca
Fixed
241fcb79dd1df276d80b19f5f6acc9eaaaa63309
Fixed
326192b99c903a2193d820c30ed936cc2402382c
Fixed
9ae3d073f7db5578ae1907544f0c15947e9678e6
Fixed
ee6c33b29e624f515202a31bf6ef0437f26a1867
Fixed
da64f419d7f78272bfe40dde1262602d4ff6b32c
Fixed
45f6ce70abfb7ccf9d787781cbc4c03294a775a1
Fixed
4639d1b992de8f37d66f698056875c274efcd45f
Fixed
507b05063d1b7a1fcb9f7d7c47586fc4f3508f98

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49399.json"