CVE-2022-50887Allocation of Resources Without Limits or Throttling in Linux

Severity
3.3LOW
No vector
EPSS
0.0%
top 84.94%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 30

Description

In the Linux kernel, the following vulnerability has been resolved: regulator: core: fix unbalanced of node refcount in regulator_dev_lookup() I got the the following report: OF: ERROR: memory leak, expected refcount 1 instead of 2, of_node_get()/of_node_put() unbalanced - destroy cset entry: attach overlay node /i2c/pmic@62/regulators/exten In of_get_regulator(), the node is returned from of_parse_phandle() with refcount incremented, after using it, of_node_put() need be called.

Affected Packages4 packages

Linuxlinux/linux_kernel3.3.04.9.337+7
Debianlinux/linux_kernel< 5.10.178-1+3
CVEListV5linux/linux69511a452e6dc6b74fe4f3671a51b1b44b9c57e30e88505ac0a6ae97746bcdbd4b042ee9f20455ae+9
debiandebian/linux< linux 6.1.4-1 (bookworm)

🔴Vulnerability Details

3
OSV
regulator: core: fix unbalanced of node refcount in regulator_dev_lookup()2025-12-30
GHSA
GHSA-jpr9-mqf4-fm6w: In the Linux kernel, the following vulnerability has been resolved: regulator: core: fix unbalanced of node refcount in regulator_dev_lookup() I got2025-12-30
OSV
CVE-2022-50887: In the Linux kernel, the following vulnerability has been resolved: regulator: core: fix unbalanced of node refcount in regulator_dev_lookup() I got t2025-12-30

📋Vendor Advisories

2
Red Hat
kernel: regulator: core: fix unbalanced of node refcount in regulator_dev_lookup()2025-12-30
Debian
CVE-2022-50887: linux - In the Linux kernel, the following vulnerability has been resolved: regulator: ...2022

🕵️Threat Intelligence

1
Wiz
CVE-2022-50887 Impact, Exploitability, and Mitigation Steps | Wiz