Home

Description

In the Linux kernel, the following vulnerability has been resolved: ARM: OMAP2+: omap4-common: Fix refcount leak bug In omap4_sram_init(), of_find_compatible_node() will return a node pointer with refcount incremented. We should use of_node_put() when it is not used anymore.

PUBLISHED Reserved 2025-10-07 | Published 2025-10-07 | Updated 2025-10-07 | Assigner Linux

Product status

Default status
unaffected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 1d9452ae3bdb830f9309cf10a2f65977999cb14e
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 049875b76660bbdc4873a915afb294f954eb7320
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 7c32919a378782c95c72bc028b5c30dfe8c11f82
affected

Default status
affected

6.1.16
unaffected

6.2.3
unaffected

6.3
unaffected

References

git.kernel.org/...c/1d9452ae3bdb830f9309cf10a2f65977999cb14e

git.kernel.org/...c/049875b76660bbdc4873a915afb294f954eb7320

git.kernel.org/...c/7c32919a378782c95c72bc028b5c30dfe8c11f82

cve.org (CVE-2022-50539)

nvd.nist.gov (CVE-2022-50539)

Download JSON