5.5
MEDIUM CVSS 3.1
CVE-2022-49514
Mediatek ASoC Refcount Leak Vulnerability
Description

In the Linux kernel, the following vulnerability has been resolved: ASoC: mediatek: Fix error handling in mt8173_max98090_dev_probe Call of_node_put(platform_node) to avoid refcount leak in the error path.

INFO

Published Date :

Feb. 26, 2025, 7:01 a.m.

Last Modified :

March 17, 2025, 4:48 p.m.

Remotely Exploit :

No

Source :

416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Products

The following products are affected by CVE-2022-49514 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Linux linux_kernel
CVSS Scores
The Common Vulnerability Scoring System is a standardized framework for assessing the severity of vulnerabilities in software and systems. We collect and displays CVSS scores from various sources for each CVE.
Score Version Severity Vector Exploitability Score Impact Score Source
CVSS 3.1 MEDIUM [email protected]
Solution
Prevent resource leaks by ensuring proper node handling in the error path.
  • Apply the kernel patch to fix the reference count leak.
  • Update the Linux kernel to the patched version.
  • Verify correct reference counting in error handling.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2022-49514 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2022-49514 weaknesses.

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2022-49514 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2022-49514 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • Initial Analysis by [email protected]

    Mar. 17, 2025

    Action Type Old Value New Value
    Added CVSS V3.1 AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
    Added CWE NVD-CWE-Other
    Added CPE Configuration OR *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.20 up to (excluding) 5.4.198 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.5 up to (excluding) 5.10.121 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.11 up to (excluding) 5.15.46 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.16 up to (excluding) 5.17.14 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.18 up to (excluding) 5.18.3 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.10 up to (excluding) 4.14.283 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.2 up to (excluding) 4.9.318 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.15 up to (excluding) 4.19.247
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/0a1901f34f775b83ea4b8dbb5ed992147b9b8531 Types: Patch
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/1e932aba3c7628c9f880ee9c2cfcc2ae3ba0c01e Types: Patch
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/23f340ed906c758cec6527376768e3bc1474ac30 Types: Patch
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/48889eb3cce91d7f58e02bc07277b7f724b7a54a Types: Patch
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/4f4e0454e226de3bf4efd7e7924d1edc571c52d5 Types: Patch
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/98d5afe868df998b0244f4c229ab758b4083684a Types: Patch
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/cc43b9fdca519c5b13be6a717bacbebccd628cf6 Types: Patch
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/ebd5cb4f1f3f10b839e7575219e0f17b60c23113 Types: Patch
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/fb66e0512e5ccc093070e21cf88cce8d98c181b5 Types: Patch
  • New CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67

    Feb. 26, 2025

    Action Type Old Value New Value
    Added Description In the Linux kernel, the following vulnerability has been resolved: ASoC: mediatek: Fix error handling in mt8173_max98090_dev_probe Call of_node_put(platform_node) to avoid refcount leak in the error path.
    Added Reference https://git.kernel.org/stable/c/0a1901f34f775b83ea4b8dbb5ed992147b9b8531
    Added Reference https://git.kernel.org/stable/c/1e932aba3c7628c9f880ee9c2cfcc2ae3ba0c01e
    Added Reference https://git.kernel.org/stable/c/23f340ed906c758cec6527376768e3bc1474ac30
    Added Reference https://git.kernel.org/stable/c/48889eb3cce91d7f58e02bc07277b7f724b7a54a
    Added Reference https://git.kernel.org/stable/c/4f4e0454e226de3bf4efd7e7924d1edc571c52d5
    Added Reference https://git.kernel.org/stable/c/98d5afe868df998b0244f4c229ab758b4083684a
    Added Reference https://git.kernel.org/stable/c/cc43b9fdca519c5b13be6a717bacbebccd628cf6
    Added Reference https://git.kernel.org/stable/c/ebd5cb4f1f3f10b839e7575219e0f17b60c23113
    Added Reference https://git.kernel.org/stable/c/fb66e0512e5ccc093070e21cf88cce8d98c181b5
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
Vulnerability Scoring Details
Base CVSS Score: 5.5
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact