跳转到帖子

Ubuntu: (CVE-2022-48656): linux vulnerability

recommended_posts

发布于
  • Members

Ubuntu: (CVE-2022-48656): linux vulnerability

Severity
5
CVSS
(AV:L/AC:L/Au:S/C:N/I:N/A:C)
Published
04/28/2024
Created
11/21/2024
Added
11/19/2024
Modified
02/11/2025

Description

In the Linux kernel, the following vulnerability has been resolved: dmaengine: ti: k3-udma-private: Fix refcount leak bug in of_xudma_dev_get() We should call of_node_put() for the reference returned by of_parse_phandle() in fail path or when it is not used anymore. Here we only need to move the of_node_put() before the check.

Solution(s)

  • ubuntu-upgrade-linux
  • ubuntu-upgrade-linux-aws
  • ubuntu-upgrade-linux-aws-5-15
  • ubuntu-upgrade-linux-azure
  • ubuntu-upgrade-linux-azure-5-15
  • ubuntu-upgrade-linux-azure-fde
  • ubuntu-upgrade-linux-azure-fde-5-15
  • ubuntu-upgrade-linux-gcp
  • ubuntu-upgrade-linux-gke
  • ubuntu-upgrade-linux-gkeop
  • ubuntu-upgrade-linux-gkeop-5-15
  • ubuntu-upgrade-linux-hwe-5-15
  • ubuntu-upgrade-linux-ibm
  • ubuntu-upgrade-linux-intel-iotg
  • ubuntu-upgrade-linux-intel-iotg-5-15
  • ubuntu-upgrade-linux-kvm
  • ubuntu-upgrade-linux-lowlatency
  • ubuntu-upgrade-linux-lowlatency-hwe-5-15
  • ubuntu-upgrade-linux-nvidia
  • ubuntu-upgrade-linux-oracle
  • ubuntu-upgrade-linux-oracle-5-15
  • ubuntu-upgrade-linux-raspi
  • ubuntu-upgrade-linux-realtime
  • ubuntu-upgrade-linux-riscv-5-15

References

  • https://attackerkb.com/topics/cve-2022-48656
  • CVE - 2022-48656
  • https://git.kernel.org/linus/f9fdb0b86f087c2b7f6c6168dd0985a3c1eda87e
  • https://git.kernel.org/stable/c/a17df55bf6d536712da6902a83db82b82e67d5a2
  • https://git.kernel.org/stable/c/aa11dae059a439af82bae541b134f8f53ac177b5
  • https://git.kernel.org/stable/c/dd5a6c5a08752b613e83ad2cb5133e72a64b876d
  • https://git.kernel.org/stable/c/f9fdb0b86f087c2b7f6c6168dd0985a3c1eda87e
  • https://www.cve.org/CVERecord?id=CVE-2022-48656
View more
  • 查看数 696
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。
注意:你的帖子需要版主批准后才能看到。

游客
回帖…