{"id":"CVE-2022-49777","summary":"Input: i8042 - fix leaking of platform device on module removal","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nInput: i8042 - fix leaking of platform device on module removal\n\nAvoid resetting the module-wide i8042_platform_device pointer in\ni8042_probe() or i8042_remove(), so that the device can be properly\ndestroyed by i8042_exit() on module unload.","modified":"2026-04-03T13:14:41.549279496Z","published":"2025-05-01T14:09:13.199Z","related":["SUSE-SU-2025:01918-1","SUSE-SU-2025:01966-1","SUSE-SU-2025:01982-1","SUSE-SU-2025:01995-1","SUSE-SU-2025:02173-1","SUSE-SU-2025:02262-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49777.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/3f25add5ecf88de0f8ff2b27b6c0731a1f1b38ed"},{"type":"WEB","url":"https://git.kernel.org/stable/c/4f348b60c79671eee33c1389efe89109c93047da"},{"type":"WEB","url":"https://git.kernel.org/stable/c/81cd7e8489278d28794e7b272950c3e00c344e44"},{"type":"WEB","url":"https://git.kernel.org/stable/c/81df118e79b2136b5c016394f67a051dc508b7b6"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a32cd7feb0127bf629a82686b6e2c128139a86e5"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d5f7f6e63fed9c2ed09725d90059a28907e197e3"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49777.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49777"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"68fdb0499653a2519691e645fcb72944f6e1e220"},{"fixed":"81df118e79b2136b5c016394f67a051dc508b7b6"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"f93d5dca7d84a4c725acf87db74b12c5686bd83e"},{"fixed":"4f348b60c79671eee33c1389efe89109c93047da"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"bb672eff7447f8a26c8a66ddee613afd279bd760"},{"fixed":"3f25add5ecf88de0f8ff2b27b6c0731a1f1b38ed"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"dd33054e4c18a54645072c7a62d46cdf6d05dace"},{"fixed":"d5f7f6e63fed9c2ed09725d90059a28907e197e3"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"9222ba68c3f4065f6364b99cc641b6b019ef2d42"},{"fixed":"a32cd7feb0127bf629a82686b6e2c128139a86e5"},{"fixed":"81cd7e8489278d28794e7b272950c3e00c344e44"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-49777.json"}}],"schema_version":"1.7.5"}