{"id":"CVE-2022-49399","summary":"tty: goldfish: Use tty_port_destroy() to destroy port","details":"In the Linux kernel, the following vulnerability has been resolved:\n\ntty: goldfish: Use tty_port_destroy() to destroy port\n\nIn goldfish_tty_probe(), the port initialized through tty_port_init()\nshould be destroyed in error paths.In goldfish_tty_remove(), qtty-\u003eport\nalso should be destroyed or else might leak resources.\n\nFix the above by calling tty_port_destroy().","modified":"2026-04-02T08:27:33.442269Z","published":"2025-02-26T02:12:27.650Z","related":["SUSE-SU-2025:1027-1","SUSE-SU-2025:1176-1","SUSE-SU-2025:1183-1","SUSE-SU-2025:1194-1","SUSE-SU-2025:1241-1","SUSE-SU-2025:1263-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49399.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/241fcb79dd1df276d80b19f5f6acc9eaaaa63309"},{"type":"WEB","url":"https://git.kernel.org/stable/c/326192b99c903a2193d820c30ed936cc2402382c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/45f6ce70abfb7ccf9d787781cbc4c03294a775a1"},{"type":"WEB","url":"https://git.kernel.org/stable/c/4639d1b992de8f37d66f698056875c274efcd45f"},{"type":"WEB","url":"https://git.kernel.org/stable/c/507b05063d1b7a1fcb9f7d7c47586fc4f3508f98"},{"type":"WEB","url":"https://git.kernel.org/stable/c/9ae3d073f7db5578ae1907544f0c15947e9678e6"},{"type":"WEB","url":"https://git.kernel.org/stable/c/da64f419d7f78272bfe40dde1262602d4ff6b32c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ee6c33b29e624f515202a31bf6ef0437f26a1867"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49399.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49399"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"666b7793d4bfa9f150b5c2007ab48c755ddc53ca"},{"fixed":"241fcb79dd1df276d80b19f5f6acc9eaaaa63309"},{"fixed":"326192b99c903a2193d820c30ed936cc2402382c"},{"fixed":"9ae3d073f7db5578ae1907544f0c15947e9678e6"},{"fixed":"ee6c33b29e624f515202a31bf6ef0437f26a1867"},{"fixed":"da64f419d7f78272bfe40dde1262602d4ff6b32c"},{"fixed":"45f6ce70abfb7ccf9d787781cbc4c03294a775a1"},{"fixed":"4639d1b992de8f37d66f698056875c274efcd45f"},{"fixed":"507b05063d1b7a1fcb9f7d7c47586fc4f3508f98"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-49399.json"}}],"schema_version":"1.7.5"}