{"id":"CVE-2022-50122","summary":"ASoC: mediatek: mt8173-rt5650: Fix refcount leak in mt8173_rt5650_dev_probe","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: mediatek: mt8173-rt5650: Fix refcount leak in mt8173_rt5650_dev_probe\n\nof_parse_phandle() returns a node pointer with refcount\nincremented, we should use of_node_put() on it when not need anymore.\nFix refcount leak in some error paths.","modified":"2026-04-11T12:44:54.731655Z","published":"2025-06-18T11:02:51.099Z","database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50122.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/06ace427953f5036b64aed658f0055f65d76fd27"},{"type":"WEB","url":"https://git.kernel.org/stable/c/403d46971936f9f704b91cecffe66e44aa39e915"},{"type":"WEB","url":"https://git.kernel.org/stable/c/5ec83aa7a9e5bcca80ccd49978916feb4e0ffc07"},{"type":"WEB","url":"https://git.kernel.org/stable/c/79f566907d27abbd7600cebe51def5081d5796b5"},{"type":"WEB","url":"https://git.kernel.org/stable/c/994f2edeeb2114bb22b62741cb8fb030fc7e5441"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e024a24fb264523149658c10c76bb363b3d0004d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e38e4952ac7a316c9002af30980d6aa850214474"},{"type":"WEB","url":"https://git.kernel.org/stable/c/efe2178d1a32492f99e7f1f2568eea5c88a85729"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50122.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50122"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"0f83f9296d5c91d08cf46cf1ba8a17fb870dedf0"},{"fixed":"06ace427953f5036b64aed658f0055f65d76fd27"},{"fixed":"e024a24fb264523149658c10c76bb363b3d0004d"},{"fixed":"79f566907d27abbd7600cebe51def5081d5796b5"},{"fixed":"403d46971936f9f704b91cecffe66e44aa39e915"},{"fixed":"994f2edeeb2114bb22b62741cb8fb030fc7e5441"},{"fixed":"e38e4952ac7a316c9002af30980d6aa850214474"},{"fixed":"5ec83aa7a9e5bcca80ccd49978916feb4e0ffc07"},{"fixed":"efe2178d1a32492f99e7f1f2568eea5c88a85729"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50122.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"4.6.0"},{"fixed":"4.14.291"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.15.0"},{"fixed":"4.19.256"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.20.0"},{"fixed":"5.4.211"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.5.0"},{"fixed":"5.10.137"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.61"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"5.18.18"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.19.0"},{"fixed":"5.19.2"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50122.json"}}],"schema_version":"1.7.5"}