CVE-2022-50480Linux vulnerability

5 documents5 sources
Severity
5.5MEDIUMNVD
EPSS
0.0%
top 97.11%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 4

Description

In the Linux kernel, the following vulnerability has been resolved: memory: pl353-smc: Fix refcount leak bug in pl353_smc_probe() The break of for_each_available_child_of_node() needs a corresponding of_node_put() when the reference 'child' is not used anymore. Here we do not need to call of_node_put() in fail path as '!match' means no break. While the of_platform_device_create() will created a new reference by 'child' but it has considered the refcounting.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages4 packages

NVDlinux/linux_kernel5.05.4.220+4
Debianlinux/linux_kernel< 5.10.158-1+3
CVEListV5linux/linuxfee10bd2267868f2a3e7ba008ef7665aac5e4412b37f4a711e5d4bf3608ccbc6de82b52e92b441a0+6
debiandebian/linux< linux 6.0.3-1 (bookworm)

Patches

🔴Vulnerability Details

2
OSV
CVE-2022-50480: In the Linux kernel, the following vulnerability has been resolved: memory: pl353-smc: Fix refcount leak bug in pl353_smc_probe() The break of for_eac2025-10-04
GHSA
GHSA-wj3v-3j93-973p: In the Linux kernel, the following vulnerability has been resolved: memory: pl353-smc: Fix refcount leak bug in pl353_smc_probe() The break of for_e2025-10-04

📋Vendor Advisories

2
Red Hat
kernel: memory: pl353-smc: Fix refcount leak bug in pl353_smc_probe()2025-10-04
Debian
CVE-2022-50480: linux - In the Linux kernel, the following vulnerability has been resolved: memory: pl3...2022