{"id":"CVE-2022-49915","summary":"mISDN: fix possible memory leak in mISDN_register_device()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nmISDN: fix possible memory leak in mISDN_register_device()\n\nAfer commit 1fa5ae857bb1 (\"driver core: get rid of struct device's\nbus_id string array\"), the name of device is allocated dynamically,\nadd put_device() to give up the reference, so that the name can be\nfreed in kobject_cleanup() when the refcount is 0.\n\nSet device class before put_device() to avoid null release() function\nWARN message in device_release().","modified":"2026-04-11T12:44:41.889549Z","published":"2025-05-01T14:10:56.208Z","related":["SUSE-SU-2025:01918-1","SUSE-SU-2025:01966-1","SUSE-SU-2025:01982-1","SUSE-SU-2025:01983-1","SUSE-SU-2025:01995-1","SUSE-SU-2025:02173-1","SUSE-SU-2025:02262-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49915.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/029d5b7688a2f3a86f2a3be5a6ba9cc968c80e41"},{"type":"WEB","url":"https://git.kernel.org/stable/c/080aabfb29b2ee9cbb8894a1d039651943d3773e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/0d4e91efcaee081e919b3c50e875ecbb84290e41"},{"type":"WEB","url":"https://git.kernel.org/stable/c/2ff6b669523d3b3d253a044fa9636a67d0694995"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a636fc5a7cabd05699b5692ad838c2c7a3abec7b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d1d1aede313eb2b9a84afd60ff6cfb7c33631e0e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e77d213843e67b4373285712699b692f9c743f61"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e7d1d4d9ac0dfa40be4c2c8abd0731659869b297"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49915.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49915"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"1fa5ae857bb14f6046205171d98506d8112dd74e"},{"fixed":"d1d1aede313eb2b9a84afd60ff6cfb7c33631e0e"},{"fixed":"080aabfb29b2ee9cbb8894a1d039651943d3773e"},{"fixed":"a636fc5a7cabd05699b5692ad838c2c7a3abec7b"},{"fixed":"2ff6b669523d3b3d253a044fa9636a67d0694995"},{"fixed":"e77d213843e67b4373285712699b692f9c743f61"},{"fixed":"029d5b7688a2f3a86f2a3be5a6ba9cc968c80e41"},{"fixed":"0d4e91efcaee081e919b3c50e875ecbb84290e41"},{"fixed":"e7d1d4d9ac0dfa40be4c2c8abd0731659869b297"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49915.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"2.6.30"},{"fixed":"4.9.333"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.10.0"},{"fixed":"4.14.299"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.15.0"},{"fixed":"4.19.265"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.20.0"},{"fixed":"5.4.224"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.5.0"},{"fixed":"5.10.154"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.78"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.0.8"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49915.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}