CVE-2022-49243

In the Linux kernel, the following vulnerability has been resolved: ASoC: atmel: Add missing of_node_put() in at91sam9g20ek_audio_probe This node pointer is returned by of_parse_phandle() with refcount incremented in this function. Calling of_node_put() to avoid the refcount leak.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

21 Oct 2025, 11:51

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ASoC: atmel: se agregó la función of_node_put() faltante en at91sam9g20ek_audio_probe. Este puntero de nodo es devuelto por of_parse_phandle() con refcount incrementado en esta función. Se llama a of_node_put() para evitar la fuga de refcount.
References () https://git.kernel.org/stable/c/0325193cf40dc3a6e27d55a5b98680936deebcd0 - () https://git.kernel.org/stable/c/0325193cf40dc3a6e27d55a5b98680936deebcd0 - Patch
References () https://git.kernel.org/stable/c/32e6ceb05f36432811753852c674a301f944a24b - () https://git.kernel.org/stable/c/32e6ceb05f36432811753852c674a301f944a24b - Patch
References () https://git.kernel.org/stable/c/4793a02deb31b71b3984abc67bf1011a03c13b18 - () https://git.kernel.org/stable/c/4793a02deb31b71b3984abc67bf1011a03c13b18 - Patch
References () https://git.kernel.org/stable/c/662ee5ac6b451aa5a27b8eebd397f2f5c7f42cec - () https://git.kernel.org/stable/c/662ee5ac6b451aa5a27b8eebd397f2f5c7f42cec - Patch
References () https://git.kernel.org/stable/c/81f266396237cea09a8c6322a6a78535f06ed345 - () https://git.kernel.org/stable/c/81f266396237cea09a8c6322a6a78535f06ed345 - Patch
References () https://git.kernel.org/stable/c/a0bc36b247dcf4d21bf820bfc4bcbaf7f6cf19b5 - () https://git.kernel.org/stable/c/a0bc36b247dcf4d21bf820bfc4bcbaf7f6cf19b5 - Patch
References () https://git.kernel.org/stable/c/b0c56a0071116a37c24df998166c22a7e4684626 - () https://git.kernel.org/stable/c/b0c56a0071116a37c24df998166c22a7e4684626 - Patch
References () https://git.kernel.org/stable/c/f590797fa3c1bccdd19e55441592a23b46aef449 - () https://git.kernel.org/stable/c/f590797fa3c1bccdd19e55441592a23b46aef449 - Patch
References () https://git.kernel.org/stable/c/f8b7b9a0594715ecfbe6f18db2328d992242654a - () https://git.kernel.org/stable/c/f8b7b9a0594715ecfbe6f18db2328d992242654a - Patch
First Time Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE NVD-CWE-noinfo

26 Feb 2025, 07:01

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-26 07:01

Updated : 2025-10-21 11:51


NVD link : CVE-2022-49243

Mitre link : CVE-2022-49243

CVE.ORG link : CVE-2022-49243


JSON object : View

Products Affected

linux

  • linux_kernel