2025-03-09 03:03:50 +00:00

37 lines
1.9 KiB
JSON

{
"id": "CVE-2022-49246",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-02-26T07:01:01.537",
"lastModified": "2025-02-26T07:01:01.537",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: atmel: Fix error handling in snd_proto_probe\n\nThe device_node pointer is returned by of_parse_phandle() with refcount\nincremented. We should use of_node_put() on it when done.\n\nThis function only calls of_node_put() in the regular path.\nAnd it will cause refcount leak in error paths.\nFix this by calling of_node_put() in error handling too."
},
{
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ASoC: atmel: Se corrige la gesti\u00f3n de errores en snd_proto_probe El puntero device_node es devuelto por of_parse_phandle() con refcount incrementado. Deber\u00edamos usar of_node_put() en \u00e9l cuando haya terminado. Esta funci\u00f3n solo llama a of_node_put() en la ruta regular. Y provocar\u00e1 una fuga de refcount en las rutas de error. Corrija esto llamando tambi\u00e9n a of_node_put() en la gesti\u00f3n de errores."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/0f517480d5888cd54487c5662ce4da95b30ad798",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/8fa969cd8485031294f91fc7184399000cae6355",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/b0bfaf0544d08d093d6211d7ef8816fb0b5b6c75",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/f32ac9bf5e3f594ef9bfedb410aebc98cf784e69",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}