CVE-2022-49399

Source
https://cve.org/CVERecord?id=CVE-2022-49399
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49399.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49399
Downstream
Related
Published
2025-02-26T02:12:27.650Z
Modified
2026-04-11T12:43:59.588013Z
Summary
tty: goldfish: Use tty_port_destroy() to destroy port
Details

In the Linux kernel, the following vulnerability has been resolved:

tty: goldfish: Use ttyportdestroy() to destroy port

In goldfishttyprobe(), the port initialized through ttyportinit() should be destroyed in error paths.In goldfishttyremove(), qtty->port also should be destroyed or else might leak resources.

Fix the above by calling ttyportdestroy().

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49399.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
666b7793d4bfa9f150b5c2007ab48c755ddc53ca
Fixed
241fcb79dd1df276d80b19f5f6acc9eaaaa63309
Fixed
326192b99c903a2193d820c30ed936cc2402382c
Fixed
9ae3d073f7db5578ae1907544f0c15947e9678e6
Fixed
ee6c33b29e624f515202a31bf6ef0437f26a1867
Fixed
da64f419d7f78272bfe40dde1262602d4ff6b32c
Fixed
45f6ce70abfb7ccf9d787781cbc4c03294a775a1
Fixed
4639d1b992de8f37d66f698056875c274efcd45f
Fixed
507b05063d1b7a1fcb9f7d7c47586fc4f3508f98

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49399.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
3.9.0
Fixed
4.14.283
Type
ECOSYSTEM
Events
Introduced
4.15.0
Fixed
4.19.247
Type
ECOSYSTEM
Events
Introduced
4.20.0
Fixed
5.4.198
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.122
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.47
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
5.17.15
Type
ECOSYSTEM
Events
Introduced
5.18.0
Fixed
5.18.4

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49399.json"