CVE-2022-49621

Source
https://cve.org/CVERecord?id=CVE-2022-49621
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49621.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49621
Downstream
Related
Published
2025-02-26T02:23:38.850Z
Modified
2026-03-20T12:22:27.865951Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
cpufreq: pmac32-cpufreq: Fix refcount leak bug
Details

In the Linux kernel, the following vulnerability has been resolved:

cpufreq: pmac32-cpufreq: Fix refcount leak bug

In pmaccpufreqinitMacRISC3(), we need to add corresponding ofnodeput() for the three node pointers whose refcount have been incremented by offindnodeby_name().

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49621.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Fixed
4f242486bf46d314b2e3838cc64b56f008a3c4d7
Fixed
37c16fc2cb13a13f3c0193bfc6f2edef7d7df7d7
Fixed
4585890ab2dbf455d80e254d3d859d4c1e357920
Fixed
8dda30f81c751b01cd71f2cfaeef26ad4393b1d1
Fixed
3ea9dbf7c2f436952bca331c6f5d72f75aca224e
Fixed
57289b6601fe78c09921599b042a0b430fb420ec
Fixed
4513018d0bd739097570d26a7760551cba3deb56
Fixed
ccd7567d4b6cf187fdfa55f003a9e461ee629e36

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49621.json"