CVE-2022-49835

In the Linux kernel, the following vulnerability has been resolved: ALSA: hda: fix potential memleak in 'add_widget_node' As 'kobject_add' may allocated memory for 'kobject->name' when return error. And in this function, if call 'kobject_add' failed didn't free kobject. So call 'kobject_put' to recycling resources.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*

History

10 Nov 2025, 21:12

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/02dea987ec1cac712c78e75d224ceb9bb73519ed - () https://git.kernel.org/stable/c/02dea987ec1cac712c78e75d224ceb9bb73519ed - Patch
References () https://git.kernel.org/stable/c/3a79f9568de08657fcdbc41d6fc4c0ca145a7a2b - () https://git.kernel.org/stable/c/3a79f9568de08657fcdbc41d6fc4c0ca145a7a2b - Patch
References () https://git.kernel.org/stable/c/455d99bd6baf19688048b6d42d9fa74eae27f93b - () https://git.kernel.org/stable/c/455d99bd6baf19688048b6d42d9fa74eae27f93b - Patch
References () https://git.kernel.org/stable/c/7140d7aaf93da6a665b454f91bb4dc6b1de218bd - () https://git.kernel.org/stable/c/7140d7aaf93da6a665b454f91bb4dc6b1de218bd - Patch
References () https://git.kernel.org/stable/c/90b7d055e2b5f39429f9a9e3815b48a48530ef28 - () https://git.kernel.org/stable/c/90b7d055e2b5f39429f9a9e3815b48a48530ef28 - Patch
References () https://git.kernel.org/stable/c/9a5523f72bd2b0d66eef3d58810c6eb7b5ffc143 - () https://git.kernel.org/stable/c/9a5523f72bd2b0d66eef3d58810c6eb7b5ffc143 - Patch
References () https://git.kernel.org/stable/c/b688a3ec235222d9a84e43a48a6f31acb95baf2d - () https://git.kernel.org/stable/c/b688a3ec235222d9a84e43a48a6f31acb95baf2d - Patch
References () https://git.kernel.org/stable/c/bb0ac8d5e541224f599bc8e8f31a313faa4bf7b7 - () https://git.kernel.org/stable/c/bb0ac8d5e541224f599bc8e8f31a313faa4bf7b7 - Patch
First Time Linux linux Kernel
Linux
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE CWE-401

Information

Published : 2025-05-01 15:16

Updated : 2025-11-10 21:12


NVD link : CVE-2022-49835

Mitre link : CVE-2022-49835

CVE.ORG link : CVE-2022-49835


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-401

Missing Release of Memory after Effective Lifetime