In the Linux kernel, the following vulnerability has been resolved:
soc: bcm: brcmstb: pm: pm-arm: Fix refcount leak in brcmstbpmprobe
offindmatchingnode() returns a node pointer with refcount incremented, we should use ofnodeput() on it when not need anymore. Add missing ofnode_put() to avoid refcount leak.
In brcmstbinitsram, it pass dn to ofaddresstoresource(), ofaddresstoresource() will call offinddevicebynode() to take reference, so we should release the reference returned by offindmatching_node().
[
{
"id": "CVE-2022-49678-1016576b",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4f5877bdf7b593e988f1924f4c3df6523f80b39c",
"signature_version": "v1",
"deprecated": false,
"target": {
"file": "drivers/soc/bcm/brcmstb/pm/pm-arm.c"
},
"digest": {
"line_hashes": [
"86026532007368624893433859423543754848",
"72935442736791625547499915043720928578",
"313477807502749041185950778702612636899",
"246992060716890688293257761993218246045"
],
"threshold": 0.9
},
"signature_type": "Line"
},
{
"id": "CVE-2022-49678-1ba10186",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@734a4d15142bb4c8ecad2d8ec70d7564e78ae34d",
"signature_version": "v1",
"deprecated": false,
"target": {
"file": "drivers/soc/bcm/brcmstb/pm/pm-arm.c"
},
"digest": {
"line_hashes": [
"86026532007368624893433859423543754848",
"72935442736791625547499915043720928578",
"313477807502749041185950778702612636899",
"246992060716890688293257761993218246045"
],
"threshold": 0.9
},
"signature_type": "Line"
},
{
"id": "CVE-2022-49678-2be9a56a",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4f5877bdf7b593e988f1924f4c3df6523f80b39c",
"signature_version": "v1",
"deprecated": false,
"target": {
"function": "brcmstb_pm_probe",
"file": "drivers/soc/bcm/brcmstb/pm/pm-arm.c"
},
"digest": {
"length": 3047.0,
"function_hash": "245086426136241371273740534285729126967"
},
"signature_type": "Function"
},
{
"id": "CVE-2022-49678-30263b8a",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@37d838de369b07b596c19ff3662bf0293fdb09ee",
"signature_version": "v1",
"deprecated": false,
"target": {
"file": "drivers/soc/bcm/brcmstb/pm/pm-arm.c"
},
"digest": {
"line_hashes": [
"86026532007368624893433859423543754848",
"72935442736791625547499915043720928578",
"313477807502749041185950778702612636899",
"246992060716890688293257761993218246045"
],
"threshold": 0.9
},
"signature_type": "Line"
},
{
"id": "CVE-2022-49678-3639de46",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@30bbfeb480ae8b5ee43199d72417b232590440c2",
"signature_version": "v1",
"deprecated": false,
"target": {
"function": "brcmstb_pm_probe",
"file": "drivers/soc/bcm/brcmstb/pm/pm-arm.c"
},
"digest": {
"length": 3047.0,
"function_hash": "245086426136241371273740534285729126967"
},
"signature_type": "Function"
},
{
"id": "CVE-2022-49678-4886d8f8",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@10ba9d499a9fd82ed40897e734ba19870a879407",
"signature_version": "v1",
"deprecated": false,
"target": {
"function": "brcmstb_pm_probe",
"file": "drivers/soc/bcm/brcmstb/pm/pm-arm.c"
},
"digest": {
"length": 3047.0,
"function_hash": "245086426136241371273740534285729126967"
},
"signature_type": "Function"
},
{
"id": "CVE-2022-49678-4f8fad71",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@dcafd5463d8f20c4f90ddc138a5738adb99f74c8",
"signature_version": "v1",
"deprecated": false,
"target": {
"file": "drivers/soc/bcm/brcmstb/pm/pm-arm.c"
},
"digest": {
"line_hashes": [
"86026532007368624893433859423543754848",
"72935442736791625547499915043720928578",
"313477807502749041185950778702612636899",
"246992060716890688293257761993218246045"
],
"threshold": 0.9
},
"signature_type": "Line"
},
{
"id": "CVE-2022-49678-6afc67a0",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@30bbfeb480ae8b5ee43199d72417b232590440c2",
"signature_version": "v1",
"deprecated": false,
"target": {
"file": "drivers/soc/bcm/brcmstb/pm/pm-arm.c"
},
"digest": {
"line_hashes": [
"86026532007368624893433859423543754848",
"72935442736791625547499915043720928578",
"313477807502749041185950778702612636899",
"246992060716890688293257761993218246045"
],
"threshold": 0.9
},
"signature_type": "Line"
},
{
"id": "CVE-2022-49678-942b6811",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@37d838de369b07b596c19ff3662bf0293fdb09ee",
"signature_version": "v1",
"deprecated": false,
"target": {
"function": "brcmstb_pm_probe",
"file": "drivers/soc/bcm/brcmstb/pm/pm-arm.c"
},
"digest": {
"length": 3047.0,
"function_hash": "245086426136241371273740534285729126967"
},
"signature_type": "Function"
},
{
"id": "CVE-2022-49678-d89fb777",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@10ba9d499a9fd82ed40897e734ba19870a879407",
"signature_version": "v1",
"deprecated": false,
"target": {
"file": "drivers/soc/bcm/brcmstb/pm/pm-arm.c"
},
"digest": {
"line_hashes": [
"86026532007368624893433859423543754848",
"72935442736791625547499915043720928578",
"313477807502749041185950778702612636899",
"246992060716890688293257761993218246045"
],
"threshold": 0.9
},
"signature_type": "Line"
},
{
"id": "CVE-2022-49678-dfa46d75",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@dcafd5463d8f20c4f90ddc138a5738adb99f74c8",
"signature_version": "v1",
"deprecated": false,
"target": {
"function": "brcmstb_pm_probe",
"file": "drivers/soc/bcm/brcmstb/pm/pm-arm.c"
},
"digest": {
"length": 3047.0,
"function_hash": "245086426136241371273740534285729126967"
},
"signature_type": "Function"
},
{
"id": "CVE-2022-49678-e0980306",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@734a4d15142bb4c8ecad2d8ec70d7564e78ae34d",
"signature_version": "v1",
"deprecated": false,
"target": {
"function": "brcmstb_pm_probe",
"file": "drivers/soc/bcm/brcmstb/pm/pm-arm.c"
},
"digest": {
"length": 3047.0,
"function_hash": "245086426136241371273740534285729126967"
},
"signature_type": "Function"
}
]