CVE-2022-50106

In the Linux kernel, the following vulnerability has been resolved: powerpc/cell/axon_msi: Fix refcount leak in setup_msi_msg_address of_get_next_parent() returns a node pointer with refcount incremented, we should use of_node_put() on it when not need anymore. Add missing of_node_put() in the error path to avoid refcount leak.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

19 Nov 2025, 13:29

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/00dc7cbbb558955ff410fd392cc9b0366eb06df0 - () https://git.kernel.org/stable/c/00dc7cbbb558955ff410fd392cc9b0366eb06df0 - Patch
References () https://git.kernel.org/stable/c/02ed44125d7a7238999750ca126b60f8dd7a88b1 - () https://git.kernel.org/stable/c/02ed44125d7a7238999750ca126b60f8dd7a88b1 - Patch
References () https://git.kernel.org/stable/c/51cf876b11fb6ca06f69e9d1de58f892d1522e9d - () https://git.kernel.org/stable/c/51cf876b11fb6ca06f69e9d1de58f892d1522e9d - Patch
References () https://git.kernel.org/stable/c/5eaa93caa63abf382b319dbe2f032232026740c2 - () https://git.kernel.org/stable/c/5eaa93caa63abf382b319dbe2f032232026740c2 - Patch
References () https://git.kernel.org/stable/c/6263ec8032c411b8ef6b7f00198cb18c855ee6cb - () https://git.kernel.org/stable/c/6263ec8032c411b8ef6b7f00198cb18c855ee6cb - Patch
References () https://git.kernel.org/stable/c/af41cff4ada533b1cf40de6c468ba164fd32c22d - () https://git.kernel.org/stable/c/af41cff4ada533b1cf40de6c468ba164fd32c22d - Patch
References () https://git.kernel.org/stable/c/df5d4b616ee76abc97e5bd348e22659c2b095b1c - () https://git.kernel.org/stable/c/df5d4b616ee76abc97e5bd348e22659c2b095b1c - Patch
References () https://git.kernel.org/stable/c/f388643657cd5a04dc47a68d85321876c5b4c208 - () https://git.kernel.org/stable/c/f388643657cd5a04dc47a68d85321876c5b4c208 - Patch
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: powerpc/cell/axon_msi: Se corrige la fuga de recuento de referencias en setup_msi_msg_address. of_get_next_parent() devuelve un puntero de nodo con el recuento de referencias incrementado. Debemos usar of_node_put() cuando ya no sea necesario. Agregue la falta de of_node_put() en la ruta de error para evitar la fuga de recuento de referencias.
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE NVD-CWE-Other
First Time Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5

18 Jun 2025, 11:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-18 11:15

Updated : 2025-11-19 13:29


NVD link : CVE-2022-50106

Mitre link : CVE-2022-50106

CVE.ORG link : CVE-2022-50106


JSON object : View

Products Affected

linux

  • linux_kernel