lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <2025100119-CVE-2022-50458-4fa8@gregkh>
Date: Wed,  1 Oct 2025 13:45:28 +0200
From: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To: linux-cve-announce@...r.kernel.org
Cc: Greg Kroah-Hartman <gregkh@...nel.org>
Subject: CVE-2022-50458: clk: tegra: Fix refcount leak in tegra210_clock_init

From: Greg Kroah-Hartman <gregkh@...nel.org>

Description
===========

In the Linux kernel, the following vulnerability has been resolved:

clk: tegra: Fix refcount leak in tegra210_clock_init

of_find_matching_node() returns a node pointer with refcount
incremented, we should use of_node_put() on it when not need anymore.
Add missing of_node_put() to avoid refcount leak.

The Linux kernel CVE team has assigned CVE-2022-50458 to this issue.


Affected and fixed versions
===========================

	Issue introduced in 4.5 with commit 6b301a059eb2ebed1b12a900e3b21a38e48dd410 and fixed in 4.9.331 with commit a19360db83d29bd6b0de4ffad2c815d79246ba99
	Issue introduced in 4.5 with commit 6b301a059eb2ebed1b12a900e3b21a38e48dd410 and fixed in 4.14.296 with commit e715510adc20a4a07f157ece4e6d068e648a0383
	Issue introduced in 4.5 with commit 6b301a059eb2ebed1b12a900e3b21a38e48dd410 and fixed in 4.19.262 with commit ac010ec3484ba95c6ab3d946f9a83560005c13c6
	Issue introduced in 4.5 with commit 6b301a059eb2ebed1b12a900e3b21a38e48dd410 and fixed in 5.4.220 with commit 6d3ac23b952f374017e1a5249d1f03bdbc7f9878
	Issue introduced in 4.5 with commit 6b301a059eb2ebed1b12a900e3b21a38e48dd410 and fixed in 5.10.150 with commit f487137a53b1a0692211f7ae82c0a7f87c30bdbe
	Issue introduced in 4.5 with commit 6b301a059eb2ebed1b12a900e3b21a38e48dd410 and fixed in 5.15.75 with commit 417ed4432b1b40526b1cb50e535d46900505f6d9
	Issue introduced in 4.5 with commit 6b301a059eb2ebed1b12a900e3b21a38e48dd410 and fixed in 5.19.17 with commit 1a6d97139b0a370a9d0809a00e91c41f5bcd3ef1
	Issue introduced in 4.5 with commit 6b301a059eb2ebed1b12a900e3b21a38e48dd410 and fixed in 6.0.3 with commit f38f34ba1e1029b927b81b9bf9d952f4ed4007bd
	Issue introduced in 4.5 with commit 6b301a059eb2ebed1b12a900e3b21a38e48dd410 and fixed in 6.1 with commit 56c78cb1f00a9dde8cd762131ce8f4c5eb046fbb

Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.

Unaffected versions might change over time as fixes are backported to
older supported kernel versions.  The official CVE entry at
	https://cve.org/CVERecord/?id=CVE-2022-50458
will be updated if fixes are backported, please check that for the most
up to date information about this issue.


Affected files
==============

The file(s) affected by this issue are:
	drivers/clk/tegra/clk-tegra210.c


Mitigation
==========

The Linux kernel CVE team recommends that you update to the latest
stable kernel version for this, and many other bugfixes.  Individual
changes are never tested alone, but rather are part of a larger kernel
release.  Cherry-picking individual commits is not recommended or
supported by the Linux kernel community at all.  If however, updating to
the latest release is impossible, the individual changes to resolve this
issue can be found at these commits:
	https://git.kernel.org/stable/c/a19360db83d29bd6b0de4ffad2c815d79246ba99
	https://git.kernel.org/stable/c/e715510adc20a4a07f157ece4e6d068e648a0383
	https://git.kernel.org/stable/c/ac010ec3484ba95c6ab3d946f9a83560005c13c6
	https://git.kernel.org/stable/c/6d3ac23b952f374017e1a5249d1f03bdbc7f9878
	https://git.kernel.org/stable/c/f487137a53b1a0692211f7ae82c0a7f87c30bdbe
	https://git.kernel.org/stable/c/417ed4432b1b40526b1cb50e535d46900505f6d9
	https://git.kernel.org/stable/c/1a6d97139b0a370a9d0809a00e91c41f5bcd3ef1
	https://git.kernel.org/stable/c/f38f34ba1e1029b927b81b9bf9d952f4ed4007bd
	https://git.kernel.org/stable/c/56c78cb1f00a9dde8cd762131ce8f4c5eb046fbb

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ