{ "id": "CVE-2022-49246", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:01.537", "lastModified": "2025-02-26T07:01:01.537", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: atmel: Fix error handling in snd_proto_probe\n\nThe device_node pointer is returned by of_parse_phandle() with refcount\nincremented. We should use of_node_put() on it when done.\n\nThis function only calls of_node_put() in the regular path.\nAnd it will cause refcount leak in error paths.\nFix this by calling of_node_put() in error handling too." }, { "lang": "es", "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ASoC: atmel: Se corrige la gesti\u00f3n de errores en snd_proto_probe El puntero device_node es devuelto por of_parse_phandle() con refcount incrementado. Deber\u00edamos usar of_node_put() en \u00e9l cuando haya terminado. Esta funci\u00f3n solo llama a of_node_put() en la ruta regular. Y provocar\u00e1 una fuga de refcount en las rutas de error. Corrija esto llamando tambi\u00e9n a of_node_put() en la gesti\u00f3n de errores." } ], "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/0f517480d5888cd54487c5662ce4da95b30ad798", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" }, { "url": "https://git.kernel.org/stable/c/8fa969cd8485031294f91fc7184399000cae6355", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" }, { "url": "https://git.kernel.org/stable/c/b0bfaf0544d08d093d6211d7ef8816fb0b5b6c75", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" }, { "url": "https://git.kernel.org/stable/c/f32ac9bf5e3f594ef9bfedb410aebc98cf784e69", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] }