CVE-2022-50427

In the Linux kernel, the following vulnerability has been resolved: ALSA: ac97: fix possible memory leak in snd_ac97_dev_register() If device_register() fails in snd_ac97_dev_register(), it should call put_device() to give up reference, or the name allocated in dev_set_name() is leaked.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*

History

20 Jan 2026, 15:38

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/0f8e9a15c8ecf95057061d370a2dddaf1cee4aeb - () https://git.kernel.org/stable/c/0f8e9a15c8ecf95057061d370a2dddaf1cee4aeb - Patch
References () https://git.kernel.org/stable/c/4881bda5ea05c8c240fc8afeaa928e2bc43f61fa - () https://git.kernel.org/stable/c/4881bda5ea05c8c240fc8afeaa928e2bc43f61fa - Patch
References () https://git.kernel.org/stable/c/4fdf6f978c6b605ca0d67bf0e982b7a8fc0f4aab - () https://git.kernel.org/stable/c/4fdf6f978c6b605ca0d67bf0e982b7a8fc0f4aab - Patch
References () https://git.kernel.org/stable/c/758dbcc6fbf2286eff02743b093c70a18a407d66 - () https://git.kernel.org/stable/c/758dbcc6fbf2286eff02743b093c70a18a407d66 - Patch
References () https://git.kernel.org/stable/c/a602ec9d88f177dba78bc97fb1adecc7a71ff279 - () https://git.kernel.org/stable/c/a602ec9d88f177dba78bc97fb1adecc7a71ff279 - Patch
References () https://git.kernel.org/stable/c/bfce73088682ef0770da951f51156c36a89be490 - () https://git.kernel.org/stable/c/bfce73088682ef0770da951f51156c36a89be490 - Patch
References () https://git.kernel.org/stable/c/c68b2e9ef246117f696e360bbdd2f5736b3a7127 - () https://git.kernel.org/stable/c/c68b2e9ef246117f696e360bbdd2f5736b3a7127 - Patch
References () https://git.kernel.org/stable/c/ee8bf0946f62ef00e5db4b613a9f664ac567259a - () https://git.kernel.org/stable/c/ee8bf0946f62ef00e5db4b613a9f664ac567259a - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE CWE-401
First Time Linux
Linux linux Kernel

01 Oct 2025, 12:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-10-01 12:15

Updated : 2026-01-20 15:38


NVD link : CVE-2022-50427

Mitre link : CVE-2022-50427

CVE.ORG link : CVE-2022-50427


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-401

Missing Release of Memory after Effective Lifetime