CVE-2022-49128
26.02.2025, 07:00
In the Linux kernel, the following vulnerability has been resolved: drm/bridge: Add missing pm_runtime_put_sync pm_runtime_get_sync() will increase the rumtime PM counter even when it returns an error. Thus a pairing decrement is needed to prevent refcount leak. Fix this by replacing this API with pm_runtime_resume_and_get(), which will not change the runtime PM counter on error. Besides, a matching decrement is needed on the error handling path to keep the counter balanced.Enginsight
Vendor | Product | Version |
---|---|---|
linux | linux_kernel | 𝑥 < 5.15.34 |
linux | linux_kernel | 5.16 ≤ 𝑥 < 5.16.20 |
linux | linux_kernel | 5.17 ≤ 𝑥 < 5.17.3 |
𝑥
= Vulnerable software versions

Debian Releases