CVE-2022-50194

In the Linux kernel, the following vulnerability has been resolved: soc: qcom: aoss: Fix refcount leak in qmp_cooling_devices_register Every iteration of for_each_available_child_of_node() decrements the reference count of the previous node. When breaking early from a for_each_available_child_of_node() loop, we need to explicitly call of_node_put() on the child node. Add missing of_node_put() to avoid refcount leak.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

19 Nov 2025, 12:48

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE NVD-CWE-Other
First Time Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: soc: qcom: aoss: Se corrige la fuga de recuento de referencias en qmp_cooling_devices_register. Cada iteración de for_each_available_child_of_node() disminuye el recuento de referencias del nodo anterior. Al interrumpir un bucle for_each_available_child_of_node() antes de tiempo, debemos llamar explícitamente a of_node_put() en el nodo secundario. Añada la función of_node_put() que falta para evitar la fuga de recuento de referencias.
References () https://git.kernel.org/stable/c/053543ac1d095132fcfd1263805d6e25afbdc6a8 - () https://git.kernel.org/stable/c/053543ac1d095132fcfd1263805d6e25afbdc6a8 - Patch
References () https://git.kernel.org/stable/c/591f0697ccbac33760d3bb1ad96a5ba2b76ae9f0 - () https://git.kernel.org/stable/c/591f0697ccbac33760d3bb1ad96a5ba2b76ae9f0 - Patch
References () https://git.kernel.org/stable/c/97713ed9b6cc4abaa2dcc8357113c56520dc6d7f - () https://git.kernel.org/stable/c/97713ed9b6cc4abaa2dcc8357113c56520dc6d7f - Patch
References () https://git.kernel.org/stable/c/bc73c72a856c26df7410ddf15f42257cb4960fe9 - () https://git.kernel.org/stable/c/bc73c72a856c26df7410ddf15f42257cb4960fe9 - Patch
References () https://git.kernel.org/stable/c/ca83c61a6ccf3934cf8d01d5ade30a5034993a86 - () https://git.kernel.org/stable/c/ca83c61a6ccf3934cf8d01d5ade30a5034993a86 - Patch
References () https://git.kernel.org/stable/c/e6e0951414a314e7db3e9e24fd924b3e15515288 - () https://git.kernel.org/stable/c/e6e0951414a314e7db3e9e24fd924b3e15515288 - Patch

18 Jun 2025, 11:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-18 11:15

Updated : 2025-11-19 12:48


NVD link : CVE-2022-50194

Mitre link : CVE-2022-50194

CVE.ORG link : CVE-2022-50194


JSON object : View

Products Affected

linux

  • linux_kernel