CVE-2022-50309
media: xilinx: vipp: Fix refcount leak in xvip_graph_dma_init
Description
In the Linux kernel, the following vulnerability has been resolved: media: xilinx: vipp: Fix refcount leak in xvip_graph_dma_init of_get_child_by_name() returns a node pointer with refcount incremented, we should use of_node_put() on it when not need anymore. Add missing of_node_put() to avoid refcount leak.
INFO
Published Date :
Sept. 15, 2025, 3:15 p.m.
Last Modified :
Sept. 15, 2025, 3:22 p.m.
Remotely Exploit :
No
Source :
416baaa9-dc9f-4396-8d5f-8c081fb06d67
Solution
- Apply the patch to the Linux kernel source code.
- Recompile the kernel with the fix.
- Deploy the updated kernel.
References to Advisories, Solutions, and Tools
Here, you will find a curated list of external links that provide in-depth
information, practical solutions, and valuable tools related to
CVE-2022-50309
.
CWE - Common Weakness Enumeration
While CVE identifies
specific instances of vulnerabilities, CWE categorizes the common flaws or
weaknesses that can lead to vulnerabilities. CVE-2022-50309
is
associated with the following CWEs:
Common Attack Pattern Enumeration and Classification (CAPEC)
Common Attack Pattern Enumeration and Classification
(CAPEC)
stores attack patterns, which are descriptions of the common attributes and
approaches employed by adversaries to exploit the CVE-2022-50309
weaknesses.
We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).
Results are limited to the first 15 repositories due to potential performance issues.
The following list is the news that have been mention
CVE-2022-50309
vulnerability anywhere in the article.
The following table lists the changes that have been made to the
CVE-2022-50309
vulnerability over time.
Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.
-
New CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Sep. 15, 2025
Action Type Old Value New Value Added Description In the Linux kernel, the following vulnerability has been resolved: media: xilinx: vipp: Fix refcount leak in xvip_graph_dma_init of_get_child_by_name() returns a node pointer with refcount incremented, we should use of_node_put() on it when not need anymore. Add missing of_node_put() to avoid refcount leak. Added Reference https://git.kernel.org/stable/c/1c78f19c3a0ea312a8178a6bfd8934eb93e9b10a Added Reference https://git.kernel.org/stable/c/22b93530bbe6af9dce8e520bb6e978d1bda39d2b Added Reference https://git.kernel.org/stable/c/2630cc88327a5557aa0d9cc63be95e3c6e0a55b3 Added Reference https://git.kernel.org/stable/c/2ea7caa9684687cf3adc1467cf4af3653a776192 Added Reference https://git.kernel.org/stable/c/3336210948b22c2db43e9df2ea403d251b4d24ab Added Reference https://git.kernel.org/stable/c/3c38467c3255c428cdbd3cefaccca4662f302dc9 Added Reference https://git.kernel.org/stable/c/59b315353252abe7b8fdb8651ca31b8484ce287a Added Reference https://git.kernel.org/stable/c/6e7b3b1e4e9f739800cd8010b75a9bee8d808cee Added Reference https://git.kernel.org/stable/c/7b0efe7534071e0153708886355d80db69525d50