CVE-2022-49241

Source
https://cve.org/CVERecord?id=CVE-2022-49241
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49241.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49241
Downstream
Related
Published
2025-02-26T01:56:03.303Z
Modified
2026-04-11T12:43:47.098540Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
ASoC: atmel: Fix error handling in sam9x5_wm8731_driver_probe
Details

In the Linux kernel, the following vulnerability has been resolved:

ASoC: atmel: Fix error handling in sam9x5wm8731driver_probe

The devicenode pointer is returned by ofparsephandle() with refcount incremented. We should use ofnode_put() on it when done.

This function only calls ofnodeput() in the regular path. And it will cause refcount leak in error path.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49241.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
fdbcb3cba54b29a37dfe42acdc0e72c543e0807d
Fixed
90ac679aa6a01841da90ec5a4aaa4b5e0badddf0
Fixed
f589063b585ac6dd2081bde6c145411cf48d8d92
Fixed
14228225091a0854b1de23e5b4fe8bdeeca9683b
Fixed
f43ad5dc43240289f4cf13c16cc506f4f7087931
Fixed
740dc3e846537c3743da98bf106f376023fd085c

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49241.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
3.12.0
Fixed
5.10.110
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.33
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
5.16.19
Type
ECOSYSTEM
Events
Introduced
5.17.0
Fixed
5.17.2

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49241.json"