VYPR
Unrated severityNVD Advisory· Published Dec 9, 2025· Updated Apr 15, 2026

CVE-2022-50641

CVE-2022-50641

Description

In the Linux kernel, the following vulnerability has been resolved:

HSI: omap_ssi: Fix refcount leak in ssi_probe

When returning or breaking early from a for_each_available_child_of_node() loop, we need to explicitly call of_node_put() on the child node to possibly release the node.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A refcount leak in the Linux kernel's HSI omap_ssi driver during ssi_probe can lead to memory exhaustion.

Vulnerability

CVE-2022-50641 is a refcount leak vulnerability in the Linux kernel's HSI (High-Speed Synchronous Serial Interface) omap_ssi driver. The bug occurs in the ssi_probe function when iterating over child nodes using for_each_available_child_of_node(). If the loop exits early (via return or break), the reference count on the child device node is not decremented via of_node_put(), causing a reference leak [1][2][3].

Exploitation

To exploit this vulnerability, an attacker would need to trigger the probe of the omap_ssi driver on a system with device tree nodes that cause an early exit from the child node loop. This could be achieved by loading the driver or hot-plugging hardware that results in a probe failure. No special privileges are required beyond the ability to trigger driver probing, which may be possible from user space in some configurations.

Impact

A successful exploitation leads to a gradual depletion of kernel memory due to unreleased device node references. Over time, this can cause system instability, denial of service, or resource exhaustion. The vulnerability does not directly allow arbitrary code execution or privilege escalation.

Mitigation

The fix was applied in the Linux kernel stable tree, with commits referenced in the kernel git repository [1][2][3]. Users should update to a kernel version containing the fix. No workaround is available other than applying the patch.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

9

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

9

News mentions

0

No linked articles in our index yet.