CVE-2022-49128

In the Linux kernel, the following vulnerability has been resolved: drm/bridge: Add missing pm_runtime_put_sync pm_runtime_get_sync() will increase the rumtime PM counter even when it returns an error. Thus a pairing decrement is needed to prevent refcount leak. Fix this by replacing this API with pm_runtime_resume_and_get(), which will not change the runtime PM counter on error. Besides, a matching decrement is needed on the error handling path to keep the counter balanced.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

13 Mar 2025, 21:31

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux linux Kernel
Linux
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/ff13c90d7f7ab606b37be6d15140d19013d6736c - () https://git.kernel.org/stable/c/ff13c90d7f7ab606b37be6d15140d19013d6736c - Patch
References () https://git.kernel.org/stable/c/46f47807738441e354873546dde0b000106c068a - () https://git.kernel.org/stable/c/46f47807738441e354873546dde0b000106c068a - Patch
References () https://git.kernel.org/stable/c/9df80dc738926a2ea4bd1ce5993c3d0f4b0e855c - () https://git.kernel.org/stable/c/9df80dc738926a2ea4bd1ce5993c3d0f4b0e855c - Patch
References () https://git.kernel.org/stable/c/792533e54cd6e89191798ccd1abd590c62b9077e - () https://git.kernel.org/stable/c/792533e54cd6e89191798ccd1abd590c62b9077e - Patch
CWE NVD-CWE-Other

26 Feb 2025, 07:00

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-26 07:00

Updated : 2025-03-13 21:31


NVD link : CVE-2022-49128

Mitre link : CVE-2022-49128


JSON object : View

Products Affected

linux

  • linux_kernel