U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2022-49242 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: ASoC: mxs: Fix error handling in mxs_sgtl5000_probe This function only calls of_node_put() in the regular path. And it will cause refcount leak in error paths. For example, when codec_np is NULL, saif_np[0] and saif_np[1] are not NULL, it will cause leaks. of_node_put() will check if the node pointer is NULL, so we can call it directly to release the refcount of regular pointers.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource
https://git.kernel.org/stable/c/44acdaf7acb60054d872bed18ce0e7db8ce900ce Patch 
https://git.kernel.org/stable/c/67e12f1cb2f97468c12b59e21975eaa0f332e7d2 Patch 
https://git.kernel.org/stable/c/6ae0a4d8fec551ec581d620f0eb1fe31f755551c Patch 
https://git.kernel.org/stable/c/790d2628e3fcc819d8f5572eb5615113fb2e727a Patch 
https://git.kernel.org/stable/c/86b6cf989437e694fd0a15782b5a513853a739e0 Patch 
https://git.kernel.org/stable/c/8d880226c86f37624e2a5f3c6d92ac0ec3375f96 Patch 
https://git.kernel.org/stable/c/d2923b48d99fe663cb93d8b481c93299fcd68656 Patch 
https://git.kernel.org/stable/c/f16ad2c0e22687f80e5981c67374023f51c204b9 Patch 
https://git.kernel.org/stable/c/f8d38056bcd220ea6f0802a5586d1a12ebcce849 Patch 

Weakness Enumeration

CWE-ID CWE Name Source
NVD-CWE-Other Other cwe source acceptance level NIST  

Known Affected Software Configurations Switch to CPE 2.2

CPEs loading, please wait.

Denotes Vulnerable Software
Are we missing a CPE here? Please let us know.

Change History

2 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2022-49242
NVD Published Date:
02/26/2025
NVD Last Modified:
03/17/2025
Source:
kernel.org