Home

Description

In the Linux kernel, the following vulnerability has been resolved: memory: pl353-smc: Fix refcount leak bug in pl353_smc_probe() The break of for_each_available_child_of_node() needs a corresponding of_node_put() when the reference 'child' is not used anymore. Here we do not need to call of_node_put() in fail path as '!match' means no break. While the of_platform_device_create() will created a new reference by 'child' but it has considered the refcounting.

PUBLISHED Reserved 2025-10-04 | Published 2025-10-04 | Updated 2025-10-04 | Assigner Linux

Product status

Default status
unaffected

fee10bd2267868f2a3e7ba008ef7665aac5e4412 before b37f4a711e5d4bf3608ccbc6de82b52e92b441a0
affected

fee10bd2267868f2a3e7ba008ef7665aac5e4412 before fde46754d5483bc398018bbec3c8ef5c55219e67
affected

fee10bd2267868f2a3e7ba008ef7665aac5e4412 before 566b143aa5112a0c2784e20603778518bb799537
affected

fee10bd2267868f2a3e7ba008ef7665aac5e4412 before 44db35ceb94756ba513dcf6b69bf9e949b28469c
affected

fee10bd2267868f2a3e7ba008ef7665aac5e4412 before 49605dc25e7fb33bf8b671279d4468531da90f89
affected

fee10bd2267868f2a3e7ba008ef7665aac5e4412 before 61b3c876c1cbdb1efd1f52a1f348580e6e14efb6
affected

Default status
affected

5.0
affected

Any version before 5.0
unaffected

5.4.220
unaffected

5.10.150
unaffected

5.15.75
unaffected

5.19.17
unaffected

6.0.3
unaffected

6.1
unaffected

References

git.kernel.org/...c/b37f4a711e5d4bf3608ccbc6de82b52e92b441a0

git.kernel.org/...c/fde46754d5483bc398018bbec3c8ef5c55219e67

git.kernel.org/...c/566b143aa5112a0c2784e20603778518bb799537

git.kernel.org/...c/44db35ceb94756ba513dcf6b69bf9e949b28469c

git.kernel.org/...c/49605dc25e7fb33bf8b671279d4468531da90f89

git.kernel.org/...c/61b3c876c1cbdb1efd1f52a1f348580e6e14efb6

cve.org (CVE-2022-50480)

nvd.nist.gov (CVE-2022-50480)

Download JSON