CVE-2022-49243
Atmel ASoC Node Pointer Reference Leak
Description
In the Linux kernel, the following vulnerability has been resolved: ASoC: atmel: Add missing of_node_put() in at91sam9g20ek_audio_probe This node pointer is returned by of_parse_phandle() with refcount incremented in this function. Calling of_node_put() to avoid the refcount leak.
INFO
Published Date :
Feb. 26, 2025, 7:01 a.m.
Last Modified :
Feb. 26, 2025, 7:01 a.m.
Source :
416baaa9-dc9f-4396-8d5f-8c081fb06d67
Remotely Exploitable :
No
Impact Score :
Exploitability Score :
References to Advisories, Solutions, and Tools
Here, you will find a curated list of external links that provide in-depth
information, practical solutions, and valuable tools related to
CVE-2022-49243
.
We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).
Results are limited to the first 15 repositories due to potential performance issues.
The following list is the news that have been mention
CVE-2022-49243
vulnerability anywhere in the article.
The following table lists the changes that have been made to the
CVE-2022-49243
vulnerability over time.
Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.
-
New CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Feb. 26, 2025
Action Type Old Value New Value Added Description In the Linux kernel, the following vulnerability has been resolved: ASoC: atmel: Add missing of_node_put() in at91sam9g20ek_audio_probe This node pointer is returned by of_parse_phandle() with refcount incremented in this function. Calling of_node_put() to avoid the refcount leak. Added Reference https://git.kernel.org/stable/c/0325193cf40dc3a6e27d55a5b98680936deebcd0 Added Reference https://git.kernel.org/stable/c/32e6ceb05f36432811753852c674a301f944a24b Added Reference https://git.kernel.org/stable/c/4793a02deb31b71b3984abc67bf1011a03c13b18 Added Reference https://git.kernel.org/stable/c/662ee5ac6b451aa5a27b8eebd397f2f5c7f42cec Added Reference https://git.kernel.org/stable/c/81f266396237cea09a8c6322a6a78535f06ed345 Added Reference https://git.kernel.org/stable/c/a0bc36b247dcf4d21bf820bfc4bcbaf7f6cf19b5 Added Reference https://git.kernel.org/stable/c/b0c56a0071116a37c24df998166c22a7e4684626 Added Reference https://git.kernel.org/stable/c/f590797fa3c1bccdd19e55441592a23b46aef449 Added Reference https://git.kernel.org/stable/c/f8b7b9a0594715ecfbe6f18db2328d992242654a
CWE - Common Weakness Enumeration
While CVE identifies
specific instances of vulnerabilities, CWE categorizes the common flaws or
weaknesses that can lead to vulnerabilities. CVE-2022-49243
is
associated with the following CWEs:
Common Attack Pattern Enumeration and Classification (CAPEC)
Common Attack Pattern Enumeration and Classification
(CAPEC)
stores attack patterns, which are descriptions of the common attributes and
approaches employed by adversaries to exploit the CVE-2022-49243
weaknesses.