Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: remoteproc: k3-r5: Fix refcount leak in k3_r5_cluster_of_init Every iteration of for_each_available_child_of_node() decrements the reference count of the previous node. When breaking early from a for_each_available_child_of_node() loop, we need to explicitly call of_node_put() on the child node. Add missing of_node_put() to avoid refcount leak.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 5.10, < 5.10.137 |
References
- https://git.kernel.org/stable/c/3f83c4cf1b78331c23876977aa7b9151aff2f9e1Patch
- https://git.kernel.org/stable/c/61cd8cd3b6b33c7eae3b45cf783b114f2ae53528Patch
- https://git.kernel.org/stable/c/75358732af9b26acfe3e609943290bcba13330fcPatch
- https://git.kernel.org/stable/c/cf112a52d758092ca3d5ebdad51dd17bda5ba3e5Patch
- https://git.kernel.org/stable/c/fa220c05d282e7479abe08b54e3bdffd06c25e97Patch
FAQ
What is CVE-2022-50121?
CVE-2022-50121 is a vulnerability with a CVSS score of 5.5 (MEDIUM). In the Linux kernel, the following vulnerability has been resolved: remoteproc: k3-r5: Fix refcount leak in k3_r5_cluster_of_init Every iteration of for_each_available_child_of_node() decrements the...
How severe is CVE-2022-50121?
CVE-2022-50121 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-50121?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.