CVE-2022-50462

In the Linux kernel, the following vulnerability has been resolved: MIPS: vpe-mt: fix possible memory leak while module exiting Afer commit 1fa5ae857bb1 ("driver core: get rid of struct device's bus_id string array"), the name of device is allocated dynamically, it need be freed when module exiting, call put_device() to give up reference, so that it can be freed in kobject_cleanup() when the refcount hit to 0. The vpe_device is static, so remove kfree() from vpe_device_release().
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

16 Jan 2026, 19:14

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE CWE-401
First Time Linux
Linux linux Kernel
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/170e9913c2ed5cfc37c0adf0fdbd368d2d8d8168 - () https://git.kernel.org/stable/c/170e9913c2ed5cfc37c0adf0fdbd368d2d8d8168 - Patch
References () https://git.kernel.org/stable/c/48d42f4464d713fbdd79f334fdcd6e5be534cc67 - () https://git.kernel.org/stable/c/48d42f4464d713fbdd79f334fdcd6e5be534cc67 - Patch
References () https://git.kernel.org/stable/c/5822e8cc84ee37338ab0bdc3124f6eec04dc232d - () https://git.kernel.org/stable/c/5822e8cc84ee37338ab0bdc3124f6eec04dc232d - Patch
References () https://git.kernel.org/stable/c/851ae5640875f06494e40002cd503b11a634c6fb - () https://git.kernel.org/stable/c/851ae5640875f06494e40002cd503b11a634c6fb - Patch
References () https://git.kernel.org/stable/c/9d180e0bb21c57bd6cca2adeb672d3b522e910b5 - () https://git.kernel.org/stable/c/9d180e0bb21c57bd6cca2adeb672d3b522e910b5 - Patch
References () https://git.kernel.org/stable/c/ab3d47c1fd0202821abd473ca87580faafd47847 - () https://git.kernel.org/stable/c/ab3d47c1fd0202821abd473ca87580faafd47847 - Patch
References () https://git.kernel.org/stable/c/b191dde84e40624d5577f64db0ec922c5c0ec57c - () https://git.kernel.org/stable/c/b191dde84e40624d5577f64db0ec922c5c0ec57c - Patch
References () https://git.kernel.org/stable/c/b3325a443525e3b89151879b834519b21c5e3011 - () https://git.kernel.org/stable/c/b3325a443525e3b89151879b834519b21c5e3011 - Patch
References () https://git.kernel.org/stable/c/e820a8192ff68570100347855b567512aec43819 - () https://git.kernel.org/stable/c/e820a8192ff68570100347855b567512aec43819 - Patch

01 Oct 2025, 12:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-10-01 12:15

Updated : 2026-01-16 19:14


NVD link : CVE-2022-50462

Mitre link : CVE-2022-50462

CVE.ORG link : CVE-2022-50462


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-401

Missing Release of Memory after Effective Lifetime