{"id":"CVE-2022-50160","summary":"mtd: maps: Fix refcount leak in ap_flash_init","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nmtd: maps: Fix refcount leak in ap_flash_init\n\nof_find_matching_node() returns a node pointer with refcount\nincremented, we should use of_node_put() on it when not need anymore.\nAdd missing of_node_put() to avoid refcount leak.","modified":"2026-04-03T13:14:38.012617Z","published":"2025-06-18T11:03:16.447Z","related":["SUSE-SU-2025:02264-1","SUSE-SU-2025:02308-1","SUSE-SU-2025:02320-1","SUSE-SU-2025:02321-1","SUSE-SU-2025:02322-1","SUSE-SU-2025:02537-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50160.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/77087a04c8fd554134bddcb8a9ff87b21f357926"},{"type":"WEB","url":"https://git.kernel.org/stable/c/80b1465b2ae81ebb59bbe62bcb7a7f7d4e9ece6f"},{"type":"WEB","url":"https://git.kernel.org/stable/c/941ef6997f9db704fe4fd62fc01e420fdd5048b2"},{"type":"WEB","url":"https://git.kernel.org/stable/c/995fb2874bb5696357846a91e59181c600e6aac8"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a74322d4b897ddc268b340c4a397f6066c2f945d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/babd7b0124650ab71a6487e38588b8659b3aa2dc"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d10855876a6f47add6ff621cef25cc0171dac162"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d5730780e9ea84e5476752a47c749036c6a74af5"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50160.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50160"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"b0afd44bc192ff4c0e90a5fc1724350bcfc32b33"},{"fixed":"995fb2874bb5696357846a91e59181c600e6aac8"},{"fixed":"d10855876a6f47add6ff621cef25cc0171dac162"},{"fixed":"80b1465b2ae81ebb59bbe62bcb7a7f7d4e9ece6f"},{"fixed":"941ef6997f9db704fe4fd62fc01e420fdd5048b2"},{"fixed":"d5730780e9ea84e5476752a47c749036c6a74af5"},{"fixed":"a74322d4b897ddc268b340c4a397f6066c2f945d"},{"fixed":"babd7b0124650ab71a6487e38588b8659b3aa2dc"},{"fixed":"77087a04c8fd554134bddcb8a9ff87b21f357926"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50160.json"}}],"schema_version":"1.7.5"}