Home

Description

In the Linux kernel, the following vulnerability has been resolved: ARM: OMAP2+: omap4-common: Fix refcount leak bug In omap4_sram_init(), of_find_compatible_node() will return a node pointer with refcount incremented. We should use of_node_put() when it is not used anymore.

PUBLISHED Reserved 2025-10-07 | Published 2025-10-07 | Updated 2025-10-07 | Assigner Linux

Product status

Default status
unaffected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 1d9452ae3bdb830f9309cf10a2f65977999cb14e
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 049875b76660bbdc4873a915afb294f954eb7320
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 7c32919a378782c95c72bc028b5c30dfe8c11f82
affected

Default status
affected

6.1.16 (semver)
unaffected

6.2.3 (semver)
unaffected

6.3 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/1d9452ae3bdb830f9309cf10a2f65977999cb14e

git.kernel.org/...c/049875b76660bbdc4873a915afb294f954eb7320

git.kernel.org/...c/7c32919a378782c95c72bc028b5c30dfe8c11f82

cve.org (CVE-2022-50539)

nvd.nist.gov (CVE-2022-50539)

Download JSON