CVE-2022-49245

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-49245
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49245.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49245
Downstream
Published
2025-02-26T01:56:05.259Z
Modified
2025-11-28T15:32:18.763586Z
Summary
ASoC: rockchip: Fix PM usage reference of rockchip_i2s_tdm_resume
Details

In the Linux kernel, the following vulnerability has been resolved:

ASoC: rockchip: Fix PM usage reference of rockchipi2stdm_resume

pmruntimegetsync will increment pm usage counter even it failed. Forgetting to putting operation will result in reference leak here. We fix it by replacing it with pmruntimeresumeand_get to keep usage counter balanced.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49245.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
081068fd641403994f0505e6b91e021d3925f348
Fixed
4e5510219111607b1f1875ab3c3f0485ba3c381c
Fixed
5c1834aac759ddfd0f17c9f38db1b30adc8eb4e8
Fixed
cc5d8ac95663a5813c696008bc524b794d471215

Affected versions

v5.*

v5.15
v5.15-rc2
v5.15-rc3
v5.15-rc4
v5.15-rc5
v5.15-rc6
v5.15-rc7
v5.16
v5.16-rc1
v5.16-rc2
v5.16-rc3
v5.16-rc4
v5.16-rc5
v5.16-rc6
v5.16-rc7
v5.16-rc8
v5.16.1
v5.16.10
v5.16.11
v5.16.12
v5.16.13
v5.16.14
v5.16.15
v5.16.16
v5.16.17
v5.16.18
v5.16.2
v5.16.3
v5.16.4
v5.16.5
v5.16.6
v5.16.7
v5.16.8
v5.16.9
v5.17
v5.17-rc1
v5.17-rc2
v5.17-rc3
v5.17-rc4
v5.17-rc5
v5.17-rc6
v5.17-rc7
v5.17-rc8
v5.17.1

Database specific

vanir_signatures

[
    {
        "deprecated": false,
        "target": {
            "file": "sound/soc/rockchip/rockchip_i2s_tdm.c"
        },
        "signature_version": "v1",
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "302224182112063346450800350207582009103",
                "282334174746083558989612873361767017955",
                "142689129216984713636440602934390560925",
                "64859706420798340252665490408023239305"
            ]
        },
        "id": "CVE-2022-49245-f076de1c",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4e5510219111607b1f1875ab3c3f0485ba3c381c",
        "signature_type": "Line"
    },
    {
        "deprecated": false,
        "target": {
            "file": "sound/soc/rockchip/rockchip_i2s_tdm.c"
        },
        "signature_version": "v1",
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "302224182112063346450800350207582009103",
                "282334174746083558989612873361767017955",
                "142689129216984713636440602934390560925",
                "64859706420798340252665490408023239305"
            ]
        },
        "id": "CVE-2022-49245-f0979d7b",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@cc5d8ac95663a5813c696008bc524b794d471215",
        "signature_type": "Line"
    },
    {
        "deprecated": false,
        "target": {
            "file": "sound/soc/rockchip/rockchip_i2s_tdm.c"
        },
        "signature_version": "v1",
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "302224182112063346450800350207582009103",
                "282334174746083558989612873361767017955",
                "142689129216984713636440602934390560925",
                "64859706420798340252665490408023239305"
            ]
        },
        "id": "CVE-2022-49245-f76b559a",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5c1834aac759ddfd0f17c9f38db1b30adc8eb4e8",
        "signature_type": "Line"
    }
]

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
5.16.19
Type
ECOSYSTEM
Events
Introduced
5.17.0
Fixed
5.17.2