2025-03-09 03:03:50 +00:00

33 lines
1.6 KiB
JSON

{
"id": "CVE-2022-49245",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-02-26T07:01:01.450",
"lastModified": "2025-02-26T07:01:01.450",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: rockchip: Fix PM usage reference of rockchip_i2s_tdm_resume\n\npm_runtime_get_sync will increment pm usage counter\neven it failed. Forgetting to putting operation will\nresult in reference leak here. We fix it by replacing\nit with pm_runtime_resume_and_get to keep usage counter\nbalanced."
},
{
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ASoC: rockchip: Se corrige la referencia de uso de PM de rockchip_i2s_tdm_resume pm_runtime_get_sync, que incrementar\u00e1 el contador de uso de PM incluso si falla. Olvidar la operaci\u00f3n de colocaci\u00f3n provocar\u00e1 una fuga de referencia aqu\u00ed. Lo solucionamos reemplaz\u00e1ndolo con pm_runtime_resume_and_get para mantener equilibrado el contador de uso."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/4e5510219111607b1f1875ab3c3f0485ba3c381c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/5c1834aac759ddfd0f17c9f38db1b30adc8eb4e8",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/cc5d8ac95663a5813c696008bc524b794d471215",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}