CVE-2022-49818

In the Linux kernel, the following vulnerability has been resolved: mISDN: fix misuse of put_device() in mISDN_register_device() We should not release reference by put_device() before calling device_initialize().
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.9.333:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.14.299:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.4.224:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*

History

10 Nov 2025, 20:58

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE NVD-CWE-noinfo
First Time Linux linux Kernel
Linux
References () https://git.kernel.org/stable/c/2d25107e111a85c56f601a5470f1780ec054e6ac - () https://git.kernel.org/stable/c/2d25107e111a85c56f601a5470f1780ec054e6ac - Patch
References () https://git.kernel.org/stable/c/44658d65f6b3118f595a1229d7eed74845a5e2ac - () https://git.kernel.org/stable/c/44658d65f6b3118f595a1229d7eed74845a5e2ac - Patch
References () https://git.kernel.org/stable/c/596230471da3415e92ae6b9d2a4e26f4a81cac5a - () https://git.kernel.org/stable/c/596230471da3415e92ae6b9d2a4e26f4a81cac5a - Patch
References () https://git.kernel.org/stable/c/709aa1f73d3e9e9ea16e2c4e44f2874c5d2c382c - () https://git.kernel.org/stable/c/709aa1f73d3e9e9ea16e2c4e44f2874c5d2c382c - Patch
References () https://git.kernel.org/stable/c/81db4f182744acd004f17d7cc52dde9ea53467e6 - () https://git.kernel.org/stable/c/81db4f182744acd004f17d7cc52dde9ea53467e6 - Patch
References () https://git.kernel.org/stable/c/83672c1b83d107b0d4fe0accf1bf64d8988398e6 - () https://git.kernel.org/stable/c/83672c1b83d107b0d4fe0accf1bf64d8988398e6 - Patch
References () https://git.kernel.org/stable/c/87b336aa158201dc30a318431e63e8c5b26c4156 - () https://git.kernel.org/stable/c/87b336aa158201dc30a318431e63e8c5b26c4156 - Patch
References () https://git.kernel.org/stable/c/d40b35a7922f4df3767ad6fb8ef3dc86e31d7ba3 - () https://git.kernel.org/stable/c/d40b35a7922f4df3767ad6fb8ef3dc86e31d7ba3 - Patch
CPE cpe:2.3:o:linux:linux_kernel:4.14.299:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.9.333:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.4.224:*:*:*:*:*:*:*

Information

Published : 2025-05-01 15:16

Updated : 2025-11-10 20:58


NVD link : CVE-2022-49818

Mitre link : CVE-2022-49818

CVE.ORG link : CVE-2022-49818


JSON object : View

Products Affected

linux

  • linux_kernel