CVE-2022-49724
26.02.2025, 07:01
In the Linux kernel, the following vulnerability has been resolved: tty: goldfish: Fix free_irq() on remove Pass the correct dev_id to free_irq() to fix this splat when the driver is unbound: WARNING: CPU: 0 PID: 30 at kernel/irq/manage.c:1895 free_irq Trying to free already-free IRQ 65 Call Trace: warn_slowpath_fmt free_irq goldfish_tty_remove platform_remove device_remove device_release_driver_internal device_driver_detach unbind_store drv_attr_store ...Enginsight
| Vendor | Product | Version |
|---|---|---|
| linux | linux_kernel | 4.6 ≤ 𝑥 < 4.14.285 |
| linux | linux_kernel | 4.15 ≤ 𝑥 < 4.19.249 |
| linux | linux_kernel | 4.20 ≤ 𝑥 < 5.4.200 |
| linux | linux_kernel | 5.5 ≤ 𝑥 < 5.10.124 |
| linux | linux_kernel | 5.11 ≤ 𝑥 < 5.15.49 |
| linux | linux_kernel | 5.16 ≤ 𝑥 < 5.18.6 |
| linux | linux_kernel | 5.19:rc1 |
| linux | linux_kernel | 5.19:rc2 |
𝑥
= Vulnerable software versions
Debian Releases
Common Weakness Enumeration
References