CVE-2022-50246

Source
https://cve.org/CVERecord?id=CVE-2022-50246
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50246.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-50246
Downstream
Related
Published
2025-09-15T14:02:04.841Z
Modified
2026-03-12T03:26:19.264985Z
Summary
usb: typec: tcpci: fix of node refcount leak in tcpci_register_port()
Details

In the Linux kernel, the following vulnerability has been resolved:

usb: typec: tcpci: fix of node refcount leak in tcpciregisterport()

I got the following report while doing device(mt6370-tcpc) load test with CONFIGOFUNITTEST and CONFIGOFDYNAMIC enabled:

OF: ERROR: memory leak, expected refcount 1 instead of 2, ofnodeget()/ofnodeput() unbalanced - destroy cset entry: attach overlay node /i2c/pmic@34/tcpc/connector

The 'fwnode' set in tcpciparseconfig() which is called in tcpciregisterport(), its node refcount is increased in devicegetnamedchildnode(). It needs be put while exiting, so call fwnodehandleput() in the error path of tcpciregisterport() and in tcpciunregisterport() to avoid leak.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50246.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
5e85a04c8c0d271d7561a770b85741f186398868
Fixed
4f257e2eba419ab4cd880c822346450e4e7b2af3
Fixed
d3b6c28a71f111a6c67ddc3238aab95910fd86cf
Fixed
ba75be6f0d9d028d20852564206565a4c03e3288
Fixed
e75a324409715bd71348f79a49aa61b69dbeb676
Fixed
5f125507d2270035dfcf83fbff6cff5a143e200c
Fixed
0384e87e3fec735e47f1c133c796f32ef7a72a9b

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50246.json"