{ "id": "CVE-2022-49245", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:01.450", "lastModified": "2025-02-26T07:01:01.450", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: rockchip: Fix PM usage reference of rockchip_i2s_tdm_resume\n\npm_runtime_get_sync will increment pm usage counter\neven it failed. Forgetting to putting operation will\nresult in reference leak here. We fix it by replacing\nit with pm_runtime_resume_and_get to keep usage counter\nbalanced." }, { "lang": "es", "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ASoC: rockchip: Se corrige la referencia de uso de PM de rockchip_i2s_tdm_resume pm_runtime_get_sync, que incrementar\u00e1 el contador de uso de PM incluso si falla. Olvidar la operaci\u00f3n de colocaci\u00f3n provocar\u00e1 una fuga de referencia aqu\u00ed. Lo solucionamos reemplaz\u00e1ndolo con pm_runtime_resume_and_get para mantener equilibrado el contador de uso." } ], "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/4e5510219111607b1f1875ab3c3f0485ba3c381c", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" }, { "url": "https://git.kernel.org/stable/c/5c1834aac759ddfd0f17c9f38db1b30adc8eb4e8", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" }, { "url": "https://git.kernel.org/stable/c/cc5d8ac95663a5813c696008bc524b794d471215", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] }