{"id":"CVE-2022-49224","summary":"power: supply: ab8500: Fix memory leak in ab8500_fg_sysfs_init","details":"In the Linux kernel, the following vulnerability has been resolved:\n\npower: supply: ab8500: Fix memory leak in ab8500_fg_sysfs_init\n\nkobject_init_and_add() takes reference even when it fails.\nAccording to the doc of kobject_init_and_add()：\n\n   If this function returns an error, kobject_put() must be called to\n   properly clean up the memory associated with the object.\n\nFix memory leak by calling kobject_put().","modified":"2026-04-02T08:27:24.586421Z","published":"2025-02-26T01:55:54.755Z","related":["SUSE-SU-2025:1027-1","SUSE-SU-2025:1176-1","SUSE-SU-2025:1183-1","SUSE-SU-2025:1194-1","SUSE-SU-2025:1241-1","SUSE-SU-2025:1263-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49224.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/19aa3c98ed7b2616e105946cec804f897837ab84"},{"type":"WEB","url":"https://git.kernel.org/stable/c/261041097ab3470f1120b7733cbf472712304d1e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/31cdf7897dba1f096b74f69d840f0575b8cdb9ae"},{"type":"WEB","url":"https://git.kernel.org/stable/c/41ed61364285ff38bbbe9ca8a45c8372ba72921d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/6a4760463dbc6b603690938c468839985189ce0a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/879356a6a05559582b0a7895d86d2d4359745c08"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c32f6b6196b6efc1c68990dfeaac36fb8eb3b8e1"},{"type":"WEB","url":"https://git.kernel.org/stable/c/db3a61ef8e6aef3b888baa6a85926c2230c2cc56"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ffb8e92b4cef92bd25563cf3d8b4489eb22bc61f"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49224.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49224"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"8c0984e5a75337df513047ec92a6c09d78e3e5cd"},{"fixed":"31cdf7897dba1f096b74f69d840f0575b8cdb9ae"},{"fixed":"19aa3c98ed7b2616e105946cec804f897837ab84"},{"fixed":"db3a61ef8e6aef3b888baa6a85926c2230c2cc56"},{"fixed":"41ed61364285ff38bbbe9ca8a45c8372ba72921d"},{"fixed":"879356a6a05559582b0a7895d86d2d4359745c08"},{"fixed":"ffb8e92b4cef92bd25563cf3d8b4489eb22bc61f"},{"fixed":"261041097ab3470f1120b7733cbf472712304d1e"},{"fixed":"c32f6b6196b6efc1c68990dfeaac36fb8eb3b8e1"},{"fixed":"6a4760463dbc6b603690938c468839985189ce0a"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-49224.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}