In the Linux kernel, the following vulnerability has been resolved:
rpmsg: qcomsmd: Fix refcount leak in qcomsmdparseedge
ofparsephandle() returns a node pointer with refcount incremented, we should use ofnodeput() on it when done.
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50112.json"
}[
{
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"176695736877116575382131791455788876739",
"75073972973142669178311433114516185607",
"48632431666520313177951726358251685411",
"24689009290144542885177440024516361237"
]
},
"deprecated": false,
"signature_type": "Line",
"id": "CVE-2022-50112-1506735c",
"target": {
"file": "drivers/rpmsg/qcom_smd.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@cb50423e46ea585620a6be307d7f7b71587936b7"
},
{
"digest": {
"length": 2103.0,
"function_hash": "137696120504296746221979339134593889980"
},
"signature_version": "v1",
"deprecated": false,
"signature_type": "Function",
"id": "CVE-2022-50112-84406d9d",
"target": {
"function": "qcom_smd_parse_edge",
"file": "drivers/rpmsg/qcom_smd.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@cb50423e46ea585620a6be307d7f7b71587936b7"
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"176695736877116575382131791455788876739",
"75073972973142669178311433114516185607",
"48632431666520313177951726358251685411",
"24689009290144542885177440024516361237"
]
},
"signature_version": "v1",
"deprecated": false,
"signature_type": "Line",
"id": "CVE-2022-50112-99da18d0",
"target": {
"file": "drivers/rpmsg/qcom_smd.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@65382585f067d4256ba087934f30f85c9b6984de"
},
{
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"176695736877116575382131791455788876739",
"75073972973142669178311433114516185607",
"48632431666520313177951726358251685411",
"24689009290144542885177440024516361237"
]
},
"deprecated": false,
"signature_type": "Line",
"id": "CVE-2022-50112-bad5ba59",
"target": {
"file": "drivers/rpmsg/qcom_smd.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@8ee5d40ae29e63f6fd6cbf9dcfc0a48c474013db"
},
{
"digest": {
"length": 2103.0,
"function_hash": "137696120504296746221979339134593889980"
},
"signature_version": "v1",
"deprecated": false,
"signature_type": "Function",
"id": "CVE-2022-50112-c98216ac",
"target": {
"function": "qcom_smd_parse_edge",
"file": "drivers/rpmsg/qcom_smd.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@65382585f067d4256ba087934f30f85c9b6984de"
},
{
"digest": {
"length": 2103.0,
"function_hash": "137696120504296746221979339134593889980"
},
"signature_version": "v1",
"deprecated": false,
"signature_type": "Function",
"id": "CVE-2022-50112-d7c8c56f",
"target": {
"function": "qcom_smd_parse_edge",
"file": "drivers/rpmsg/qcom_smd.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9715809b9eeb85b3f9b083857a2f29a9e2351125"
},
{
"signature_version": "v1",
"digest": {
"length": 2103.0,
"function_hash": "137696120504296746221979339134593889980"
},
"deprecated": false,
"signature_type": "Function",
"id": "CVE-2022-50112-db2b0267",
"target": {
"function": "qcom_smd_parse_edge",
"file": "drivers/rpmsg/qcom_smd.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@8ee5d40ae29e63f6fd6cbf9dcfc0a48c474013db"
},
{
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"176695736877116575382131791455788876739",
"75073972973142669178311433114516185607",
"48632431666520313177951726358251685411",
"24689009290144542885177440024516361237"
]
},
"deprecated": false,
"signature_type": "Line",
"id": "CVE-2022-50112-e5cb1f3f",
"target": {
"file": "drivers/rpmsg/qcom_smd.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9715809b9eeb85b3f9b083857a2f29a9e2351125"
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50112.json"