First published: Wed Feb 26 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: ASoC: atmel: Fix error handling in sam9x5_wm8731_driver_probe The device_node pointer is returned by of_parse_phandle() with refcount incremented. We should use of_node_put() on it when done. This function only calls of_node_put() in the regular path. And it will cause refcount leak in error path.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | ||
Linux Kernel | >=3.12<5.10.110 | |
Linux Kernel | >=5.11<5.15.33 | |
Linux Kernel | >=5.16<5.16.19 | |
Linux Kernel | >=5.17<5.17.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-49241 has been classified with a moderate severity level.
To address CVE-2022-49241, update the Linux kernel to a version that is not affected by this vulnerability.
CVE-2022-49241 affects Linux kernel versions from 3.12 up to 5.10.110, and select versions between 5.11 and 5.17.2.
CVE-2022-49241 impacts the ALSA SoC Atmel driver specifically during the probe error handling.
CVE-2022-49241 may lead to potential denial-of-service conditions if exploited in a specific environment.