In the Linux kernel, the following vulnerability has been resolved:

memory: pl353-smc: Fix refcount leak bug in pl353_smc_probe()

The break of for_each_available_child_of_node() needs a
corresponding of_node_put() when the reference 'child' is not
used anymore. Here we do not need to call of_node_put() in
fail path as '!match' means no break.

While the of_platform_device_create() will created a new
reference by 'child' but it has considered the refcounting.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Sat, 04 Oct 2025 15:30:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: memory: pl353-smc: Fix refcount leak bug in pl353_smc_probe() The break of for_each_available_child_of_node() needs a corresponding of_node_put() when the reference 'child' is not used anymore. Here we do not need to call of_node_put() in fail path as '!match' means no break. While the of_platform_device_create() will created a new reference by 'child' but it has considered the refcounting.
Title memory: pl353-smc: Fix refcount leak bug in pl353_smc_probe()
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2025-10-04T15:16:39.704Z

Reserved: 2025-10-04T15:13:33.467Z

Link: CVE-2022-50480

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-10-04T16:15:44.683

Modified: 2025-10-04T16:15:44.683

Link: CVE-2022-50480

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.