CVE-2022-50203

In the Linux kernel, the following vulnerability has been resolved: ARM: OMAP2+: display: Fix refcount leak bug In omapdss_init_fbdev(), of_find_node_by_name() will return a node pointer with refcount incremented. We should use of_node_put() when it is not used anymore.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

19 Nov 2025, 12:46

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ARM: OMAP2+: display: Se corrige el error de fuga de refcount. En omapdss_init_fbdev(), of_find_node_by_name() devolverá un puntero de nodo con refcount incrementado. Deberíamos usar of_node_put() cuando ya no se use.
References () https://git.kernel.org/stable/c/0b4f96b47ff8dc2fa35d03c4116927248796d9af - () https://git.kernel.org/stable/c/0b4f96b47ff8dc2fa35d03c4116927248796d9af - Patch
References () https://git.kernel.org/stable/c/2629d171f3d6451724549d8d10d14ac6da37a7be - () https://git.kernel.org/stable/c/2629d171f3d6451724549d8d10d14ac6da37a7be - Patch
References () https://git.kernel.org/stable/c/3e505298a75f0bbdc96e923e76e5d45d6c8f64a7 - () https://git.kernel.org/stable/c/3e505298a75f0bbdc96e923e76e5d45d6c8f64a7 - Patch
References () https://git.kernel.org/stable/c/496988a19d5c36fabf97c847db39167e42393c74 - () https://git.kernel.org/stable/c/496988a19d5c36fabf97c847db39167e42393c74 - Patch
References () https://git.kernel.org/stable/c/50b87a32a79bca6e275918a711fb8cc55e16d739 - () https://git.kernel.org/stable/c/50b87a32a79bca6e275918a711fb8cc55e16d739 - Patch
References () https://git.kernel.org/stable/c/88d556029a78999b098d26a330bb6a7de166f426 - () https://git.kernel.org/stable/c/88d556029a78999b098d26a330bb6a7de166f426 - Patch
References () https://git.kernel.org/stable/c/a89a865dc9f0600fd146224e314775b9efc9d845 - () https://git.kernel.org/stable/c/a89a865dc9f0600fd146224e314775b9efc9d845 - Patch
References () https://git.kernel.org/stable/c/bdbdf69d5b78c5712c60c0004fa6aed12da36e26 - () https://git.kernel.org/stable/c/bdbdf69d5b78c5712c60c0004fa6aed12da36e26 - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE NVD-CWE-Other
First Time Linux
Linux linux Kernel

18 Jun 2025, 11:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-18 11:15

Updated : 2025-11-19 12:46


NVD link : CVE-2022-50203

Mitre link : CVE-2022-50203

CVE.ORG link : CVE-2022-50203


JSON object : View

Products Affected

linux

  • linux_kernel