CVE-2022-50480
MEDIUMLinux kernel - Memory Corruption
Title source: llmDescription
In the Linux kernel, the following vulnerability has been resolved: memory: pl353-smc: Fix refcount leak bug in pl353_smc_probe() The break of for_each_available_child_of_node() needs a corresponding of_node_put() when the reference 'child' is not used anymore. Here we do not need to call of_node_put() in fail path as '!match' means no break. While the of_platform_device_create() will created a new reference by 'child' but it has considered the refcounting.
References (6)
Scores
CVSS v3
5.5
EPSS
0.0001
EPSS Percentile
1.2%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Classification
Status
published
Affected Products (6)
linux/linux_kernel
< 5.4.220
linux/Kernel
< 5.4.220linux
linux/Kernel
< 5.10.150linux
linux/Kernel
< 5.15.75linux
linux/Kernel
< 5.19.17linux
linux/Kernel
< 6.0.3linux
Timeline
Published
Oct 04, 2025
Tracked Since
Feb 18, 2026