CVE-2022-50111
BaseFortify
Publication date: 2025-06-18
Last updated on: 2025-11-19
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-Other |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a reference count leak in the Linux kernel's ASoC mt6359 driver. Specifically, in the functions mt6359_parse_dt() and mt6359_accdet_parse_dt(), the code fails to call of_node_put() for the reference obtained by of_get_child_by_name(), which causes the reference count to increase improperly and leads to a resource leak.
How can this vulnerability impact me? :
The reference count leak can lead to resource exhaustion in the kernel, potentially causing degraded system performance or instability over time due to unreleased references in the device tree parsing code of the mt6359 driver.