U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2022-50887 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: regulator: core: fix unbalanced of node refcount in regulator_dev_lookup() I got the the following report: OF: ERROR: memory leak, expected refcount 1 instead of 2, of_node_get()/of_node_put() unbalanced - destroy cset entry: attach overlay node /i2c/pmic@62/regulators/exten In of_get_regulator(), the node is returned from of_parse_phandle() with refcount incremented, after using it, of_node_put() need be called.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

URL Source(s) Tag(s)
https://git.kernel.org/stable/c/0e88505ac0a6ae97746bcdbd4b042ee9f20455ae kernel.org
https://git.kernel.org/stable/c/2b93c58adddd98812ad928bbc2063038f3df1ffd kernel.org
https://git.kernel.org/stable/c/2f98469c3141f8e42ba11075a273fb795bbad57f kernel.org
https://git.kernel.org/stable/c/3ac888db0f67813d91373a9a61c840f815cd4ec9 kernel.org
https://git.kernel.org/stable/c/4dfcf5087db9a34a300d6b99009232d4537c3e6a kernel.org
https://git.kernel.org/stable/c/cda1895f3b7f324ece1614308a815a3994983b97 kernel.org
https://git.kernel.org/stable/c/d39937f8de641c44a337cec4a2e5d3e8add20a7d kernel.org
https://git.kernel.org/stable/c/f2b41b748c19962b82709d9f23c6b2b0ce9d2f91 kernel.org
https://git.kernel.org/stable/c/f48c474efe05cf9ce5e535b5e0ddd710e963936c kernel.org

Weakness Enumeration

CWE-ID CWE Name Source

Change History

1 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2022-50887
NVD Published Date:
12/30/2025
NVD Last Modified:
12/30/2025
Source:
kernel.org