-

CVE-2022-50887

In the Linux kernel, the following vulnerability has been resolved:

regulator: core: fix unbalanced of node refcount in regulator_dev_lookup()

I got the the following report:

  OF: ERROR: memory leak, expected refcount 1 instead of 2,
  of_node_get()/of_node_put() unbalanced - destroy cset entry:
  attach overlay node /i2c/pmic@62/regulators/exten

In of_get_regulator(), the node is returned from of_parse_phandle()
with refcount incremented, after using it, of_node_put() need be called.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < 0e88505ac0a6ae97746bcdbd4b042ee9f20455ae
Version 69511a452e6dc6b74fe4f3671a51b1b44b9c57e3
Status affected
Version < 4dfcf5087db9a34a300d6b99009232d4537c3e6a
Version 69511a452e6dc6b74fe4f3671a51b1b44b9c57e3
Status affected
Version < 3ac888db0f67813d91373a9a61c840f815cd4ec9
Version 69511a452e6dc6b74fe4f3671a51b1b44b9c57e3
Status affected
Version < d39937f8de641c44a337cec4a2e5d3e8add20a7d
Version 69511a452e6dc6b74fe4f3671a51b1b44b9c57e3
Status affected
Version < f48c474efe05cf9ce5e535b5e0ddd710e963936c
Version 69511a452e6dc6b74fe4f3671a51b1b44b9c57e3
Status affected
Version < cda1895f3b7f324ece1614308a815a3994983b97
Version 69511a452e6dc6b74fe4f3671a51b1b44b9c57e3
Status affected
Version < 2b93c58adddd98812ad928bbc2063038f3df1ffd
Version 69511a452e6dc6b74fe4f3671a51b1b44b9c57e3
Status affected
Version < 2f98469c3141f8e42ba11075a273fb795bbad57f
Version 69511a452e6dc6b74fe4f3671a51b1b44b9c57e3
Status affected
Version < f2b41b748c19962b82709d9f23c6b2b0ce9d2f91
Version 69511a452e6dc6b74fe4f3671a51b1b44b9c57e3
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 3.3
Status affected
Version < 3.3
Version 0
Status unaffected
Version <= 4.9.*
Version 4.9.337
Status unaffected
Version <= 4.14.*
Version 4.14.303
Status unaffected
Version <= 4.19.*
Version 4.19.270
Status unaffected
Version <= 5.4.*
Version 5.4.229
Status unaffected
Version <= 5.10.*
Version 5.10.163
Status unaffected
Version <= 5.15.*
Version 5.15.86
Status unaffected
Version <= 6.0.*
Version 6.0.16
Status unaffected
Version <= 6.1.*
Version 6.1.2
Status unaffected
Version <= *
Version 6.2
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.05% 0.145
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
Es wurden noch keine Informationen zu CWE veröffentlicht.