CVE-2022-50033

In the Linux kernel, the following vulnerability has been resolved: usb: host: ohci-ppc-of: Fix refcount leak bug In ohci_hcd_ppc_of_probe(), of_find_compatible_node() will return a node pointer with refcount incremented. We should use of_node_put() when it is not used anymore.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

13 Nov 2025, 18:42

Type Values Removed Values Added
First Time Linux
Linux linux Kernel
CWE NVD-CWE-Other
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: usb: host: ohci-ppc-of: Se corrige el error de fuga de refcount. En ohci_hcd_ppc_of_probe(), of_find_compatible_node() devolverá un puntero de nodo con refcount incrementado. Deberíamos usar of_node_put() cuando ya no se use.
References () https://git.kernel.org/stable/c/0334d23c56ecf1ee1563bb83e29cc5a51ed7fb4e - () https://git.kernel.org/stable/c/0334d23c56ecf1ee1563bb83e29cc5a51ed7fb4e - Patch
References () https://git.kernel.org/stable/c/0fc62bbc95319bbd330e3645afc7c286acec9ef8 - () https://git.kernel.org/stable/c/0fc62bbc95319bbd330e3645afc7c286acec9ef8 - Patch
References () https://git.kernel.org/stable/c/403132881e66db7aa98b55c6655daedd80d407fd - () https://git.kernel.org/stable/c/403132881e66db7aa98b55c6655daedd80d407fd - Patch
References () https://git.kernel.org/stable/c/40a959d7042bb7711e404ad2318b30e9f92c6b9b - () https://git.kernel.org/stable/c/40a959d7042bb7711e404ad2318b30e9f92c6b9b - Patch
References () https://git.kernel.org/stable/c/c5c5bd5cdcc6dc9f75f53d1c89af463d39a2bb96 - () https://git.kernel.org/stable/c/c5c5bd5cdcc6dc9f75f53d1c89af463d39a2bb96 - Patch
References () https://git.kernel.org/stable/c/cb5dd65e889163e723df1c2f02288cc527a57785 - () https://git.kernel.org/stable/c/cb5dd65e889163e723df1c2f02288cc527a57785 - Patch
References () https://git.kernel.org/stable/c/ec583e300aee9f152a64911445092d18e1c36729 - () https://git.kernel.org/stable/c/ec583e300aee9f152a64911445092d18e1c36729 - Patch
References () https://git.kernel.org/stable/c/fe6fe64403710287f0ae61a516954d8a4f7c9e3f - () https://git.kernel.org/stable/c/fe6fe64403710287f0ae61a516954d8a4f7c9e3f - Patch

18 Jun 2025, 11:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-18 11:15

Updated : 2025-11-13 18:42


NVD link : CVE-2022-50033

Mitre link : CVE-2022-50033

CVE.ORG link : CVE-2022-50033


JSON object : View

Products Affected

linux

  • linux_kernel