{"id":"CVE-2022-50019","summary":"tty: serial: Fix refcount leak bug in ucc_uart.c","details":"In the Linux kernel, the following vulnerability has been resolved:\n\ntty: serial: Fix refcount leak bug in ucc_uart.c\n\nIn soc_info(), of_find_node_by_type() will return a node pointer\nwith refcount incremented. We should use of_node_put() when it is\nnot used anymore.","modified":"2026-04-11T12:44:48.368312Z","published":"2025-06-18T11:01:23.332Z","related":["SUSE-SU-2025:02264-1","SUSE-SU-2025:02308-1","SUSE-SU-2025:02320-1","SUSE-SU-2025:02321-1","SUSE-SU-2025:02322-1","SUSE-SU-2025:02537-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50019.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/17c32546166d8a7d2579c4b57c8b16241f94a66b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/59bc4c19d53bdac61ec952c01c6e864f5f0f8367"},{"type":"WEB","url":"https://git.kernel.org/stable/c/81939c4fbc2d5c754d0f1c1f05149d4b70d751ed"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8245e7d1d7f75a9255ad1e8146752e5051d528b8"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ca3fc1c38e4253bc019881301a28ea60b8b0bca3"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d24d7bb2cd947676f9b71fb944d045e09b8b282f"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ec56f886f3bf0f15f7a3844d4c025e165b8e8de7"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f6ed634eedb1a8a6a8cb110a7695c7abb70ffcbf"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50019.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50019"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"d7584ed2b994a572326650b0c4d2c25961e6f49d"},{"fixed":"8245e7d1d7f75a9255ad1e8146752e5051d528b8"},{"fixed":"ec56f886f3bf0f15f7a3844d4c025e165b8e8de7"},{"fixed":"59bc4c19d53bdac61ec952c01c6e864f5f0f8367"},{"fixed":"ca3fc1c38e4253bc019881301a28ea60b8b0bca3"},{"fixed":"81939c4fbc2d5c754d0f1c1f05149d4b70d751ed"},{"fixed":"17c32546166d8a7d2579c4b57c8b16241f94a66b"},{"fixed":"f6ed634eedb1a8a6a8cb110a7695c7abb70ffcbf"},{"fixed":"d24d7bb2cd947676f9b71fb944d045e09b8b282f"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50019.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"2.6.25"},{"fixed":"4.9.326"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.10.0"},{"fixed":"4.14.291"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.15.0"},{"fixed":"4.19.256"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.20.0"},{"fixed":"5.4.211"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.5.0"},{"fixed":"5.10.138"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.63"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"5.19.4"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50019.json"}}],"schema_version":"1.7.5"}