In the Linux kernel, the following vulnerability has been resolved:
ASoC: mediatek: Fix error handling in mt8183da7219max98357devprobe
The devicenode pointer is returned by ofparsephandle() with refcount incremented. We should use ofnode_put() on it when done.
This function only calls ofnodeput() in the regular path. And it will cause refcount leak in error paths. Fix this by calling ofnodeput() in error handling too.
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49161.json"
}"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-49161.json"
[
{
"signature_version": "v1",
"target": {
"file": "sound/soc/mediatek/mt8183/mt8183-da7219-max98357.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9b9f6227e8d0c7c46b6d9d7b8a5c4e0536049fcf",
"deprecated": false,
"digest": {
"line_hashes": [
"65501527775131619571149429230154104162",
"260367647435168145076870225721619214262",
"110093779006421015896018915173938325982",
"8663944668668077003905903983302919664",
"85895470920805532871902838765014383083",
"230489420947239021291890687176581450591",
"218035312526096698632299927591757261137",
"24723944664309534005699852557122720650",
"148337855940024867870171556565511707577",
"317151329878629975461073699843033533285",
"271140995648079660433375111497134196528",
"214116119015104118941724259476543154067",
"312610412009214102286442316626990749749",
"290573213249271118915534837197861710910",
"337463911794488213081518410986990578522",
"305594322013719444585840641348851489874",
"226200668822064829910609007136807375964",
"138899899394785348858615394185461430682",
"221036798834567188201339151854640427671",
"279028495556983717236242380679144670907",
"183137785105854192837559906785360916080"
],
"threshold": 0.9
},
"id": "CVE-2022-49161-52ad7950",
"signature_type": "Line"
},
{
"signature_version": "v1",
"target": {
"file": "sound/soc/mediatek/mt8183/mt8183-da7219-max98357.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@28a265a1ee11febeec5ea73a804f30dcec3181ca",
"deprecated": false,
"digest": {
"line_hashes": [
"65501527775131619571149429230154104162",
"260367647435168145076870225721619214262",
"110093779006421015896018915173938325982",
"8663944668668077003905903983302919664",
"85895470920805532871902838765014383083",
"230489420947239021291890687176581450591",
"218035312526096698632299927591757261137",
"24723944664309534005699852557122720650",
"148337855940024867870171556565511707577",
"317151329878629975461073699843033533285",
"271140995648079660433375111497134196528",
"214116119015104118941724259476543154067",
"312610412009214102286442316626990749749",
"290573213249271118915534837197861710910",
"337463911794488213081518410986990578522",
"305594322013719444585840641348851489874",
"226200668822064829910609007136807375964",
"138899899394785348858615394185461430682",
"221036798834567188201339151854640427671",
"279028495556983717236242380679144670907",
"183137785105854192837559906785360916080"
],
"threshold": 0.9
},
"id": "CVE-2022-49161-8ee52891",
"signature_type": "Line"
},
{
"signature_version": "v1",
"target": {
"file": "sound/soc/mediatek/mt8183/mt8183-da7219-max98357.c",
"function": "mt8183_da7219_max98357_dev_probe"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9b9f6227e8d0c7c46b6d9d7b8a5c4e0536049fcf",
"deprecated": false,
"digest": {
"function_hash": "239754358745899814878957626261036937978",
"length": 2814.0
},
"id": "CVE-2022-49161-b157b2af",
"signature_type": "Function"
},
{
"signature_version": "v1",
"target": {
"file": "sound/soc/mediatek/mt8183/mt8183-da7219-max98357.c",
"function": "mt8183_da7219_max98357_dev_probe"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@28a265a1ee11febeec5ea73a804f30dcec3181ca",
"deprecated": false,
"digest": {
"function_hash": "239754358745899814878957626261036937978",
"length": 2814.0
},
"id": "CVE-2022-49161-d4c4b25d",
"signature_type": "Function"
}
]