In the Linux kernel, the following vulnerability has been resolved:
ASoC: rockchip: Fix PM usage reference of rockchipi2stdm_resume
pmruntimegetsync will increment pm usage counter even it failed. Forgetting to putting operation will result in reference leak here. We fix it by replacing it with pmruntimeresumeand_get to keep usage counter balanced.
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49245.json"
}[
{
"deprecated": false,
"target": {
"file": "sound/soc/rockchip/rockchip_i2s_tdm.c"
},
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"302224182112063346450800350207582009103",
"282334174746083558989612873361767017955",
"142689129216984713636440602934390560925",
"64859706420798340252665490408023239305"
]
},
"id": "CVE-2022-49245-f076de1c",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4e5510219111607b1f1875ab3c3f0485ba3c381c",
"signature_type": "Line"
},
{
"deprecated": false,
"target": {
"file": "sound/soc/rockchip/rockchip_i2s_tdm.c"
},
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"302224182112063346450800350207582009103",
"282334174746083558989612873361767017955",
"142689129216984713636440602934390560925",
"64859706420798340252665490408023239305"
]
},
"id": "CVE-2022-49245-f0979d7b",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@cc5d8ac95663a5813c696008bc524b794d471215",
"signature_type": "Line"
},
{
"deprecated": false,
"target": {
"file": "sound/soc/rockchip/rockchip_i2s_tdm.c"
},
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"302224182112063346450800350207582009103",
"282334174746083558989612873361767017955",
"142689129216984713636440602934390560925",
"64859706420798340252665490408023239305"
]
},
"id": "CVE-2022-49245-f76b559a",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5c1834aac759ddfd0f17c9f38db1b30adc8eb4e8",
"signature_type": "Line"
}
]