In the Linux kernel, the following vulnerability has been resolved:
watchdog: ts4800wdt: Fix refcount leak in ts4800wdt_probe
ofparsephandle() returns a node pointer with refcount incremented, we should use ofnodeput() on it when done. Add missing ofnodeput() in some error paths.
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49373.json"
}[
{
"signature_type": "Line",
"deprecated": false,
"id": "CVE-2022-49373-253c46c5",
"target": {
"file": "drivers/watchdog/ts4800_wdt.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"114058495218023865722011846299557796879",
"285077697944004566517044224512517980574",
"165368146591455930516039582761981168070",
"319403092404185951344446460600839085217",
"218592723278937753500215043595821596559",
"135788172225551785135612707684142254836",
"63159439852277429026228037460518495259",
"336668971688352646275522165933943357524",
"102173596336177866090941411911665700829"
]
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5d24df3d690809952528e7a19a43d84bc5b99d44"
},
{
"signature_type": "Function",
"deprecated": false,
"id": "CVE-2022-49373-31f6ba6f",
"target": {
"file": "drivers/watchdog/ts4800_wdt.c",
"function": "ts4800_wdt_probe"
},
"digest": {
"length": 1336.0,
"function_hash": "312790487446670697909775565261456634814"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5d24df3d690809952528e7a19a43d84bc5b99d44"
},
{
"signature_type": "Function",
"deprecated": false,
"id": "CVE-2022-49373-54ac51b8",
"target": {
"file": "drivers/watchdog/ts4800_wdt.c",
"function": "ts4800_wdt_probe"
},
"digest": {
"length": 1336.0,
"function_hash": "312790487446670697909775565261456634814"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@910b1cdf6c50ae8fb222e46657d04fb181577017"
},
{
"signature_type": "Function",
"deprecated": false,
"id": "CVE-2022-49373-782b1d23",
"target": {
"file": "drivers/watchdog/ts4800_wdt.c",
"function": "ts4800_wdt_probe"
},
"digest": {
"length": 1336.0,
"function_hash": "312790487446670697909775565261456634814"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f067b5286edfd83d2d3903e8578b561599d62539"
},
{
"signature_type": "Line",
"deprecated": false,
"id": "CVE-2022-49373-c808de1c",
"target": {
"file": "drivers/watchdog/ts4800_wdt.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"114058495218023865722011846299557796879",
"285077697944004566517044224512517980574",
"165368146591455930516039582761981168070",
"319403092404185951344446460600839085217",
"218592723278937753500215043595821596559",
"135788172225551785135612707684142254836",
"63159439852277429026228037460518495259",
"336668971688352646275522165933943357524",
"102173596336177866090941411911665700829"
]
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f067b5286edfd83d2d3903e8578b561599d62539"
},
{
"signature_type": "Line",
"deprecated": false,
"id": "CVE-2022-49373-ec51335b",
"target": {
"file": "drivers/watchdog/ts4800_wdt.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"114058495218023865722011846299557796879",
"285077697944004566517044224512517980574",
"165368146591455930516039582761981168070",
"319403092404185951344446460600839085217",
"218592723278937753500215043595821596559",
"135788172225551785135612707684142254836",
"63159439852277429026228037460518495259",
"336668971688352646275522165933943357524",
"102173596336177866090941411911665700829"
]
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@910b1cdf6c50ae8fb222e46657d04fb181577017"
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-49373.json"