CVE-2022-50032
BaseFortify
Publication date: 2025-06-18
Last updated on: 2025-11-13
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-Other |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a reference count leak in the Linux kernel's Renesas USB driver. Specifically, in the function usbhs_rza1_hardware_init(), the function of_find_node_by_name() returns a node pointer with its reference count incremented, but the code does not properly decrement the reference count by calling of_node_put() when the node is no longer needed. This leads to a refcount leak bug.
How can this vulnerability impact me? :
The impact of this vulnerability is a resource leak in the kernel, which could potentially lead to increased memory usage or system instability over time if the reference counts are not properly released. However, no direct security impact such as privilege escalation or data corruption is described.