CVE-2022-50474

In the Linux kernel, the following vulnerability has been resolved: macintosh: fix possible memory leak in macio_add_one_device() Afer commit 1fa5ae857bb1 ("driver core: get rid of struct device's bus_id string array"), the name of device is allocated dynamically. It needs to be freed when of_device_register() fails. Call put_device() to give up the reference that's taken in device_initialize(), so that it can be freed in kobject_cleanup() when the refcount hits 0. macio device is freed in macio_release_dev(), so the kfree() can be removed.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

23 Jan 2026, 16:37

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/19ded60b40e86b0903c8d5bd0161437ed5107a8b - () https://git.kernel.org/stable/c/19ded60b40e86b0903c8d5bd0161437ed5107a8b - Patch
References () https://git.kernel.org/stable/c/2ac0a7059b7bcbed35bfffa34a82c9a9e99638ef - () https://git.kernel.org/stable/c/2ac0a7059b7bcbed35bfffa34a82c9a9e99638ef - Patch
References () https://git.kernel.org/stable/c/35858b87a943917fa30172aa4bf01ce7adbcb42c - () https://git.kernel.org/stable/c/35858b87a943917fa30172aa4bf01ce7adbcb42c - Patch
References () https://git.kernel.org/stable/c/3a866ff6fc2232c8e393cdb55ffb8ce947349e03 - () https://git.kernel.org/stable/c/3a866ff6fc2232c8e393cdb55ffb8ce947349e03 - Patch
References () https://git.kernel.org/stable/c/5ca86eae55a2f006e6c1edd2029b2cacb6979515 - () https://git.kernel.org/stable/c/5ca86eae55a2f006e6c1edd2029b2cacb6979515 - Patch
References () https://git.kernel.org/stable/c/76837e7f6b30da72ad59f56291e22804a219e015 - () https://git.kernel.org/stable/c/76837e7f6b30da72ad59f56291e22804a219e015 - Patch
References () https://git.kernel.org/stable/c/aa9054267366ff0a382d403d17728e21951ddbb9 - () https://git.kernel.org/stable/c/aa9054267366ff0a382d403d17728e21951ddbb9 - Patch
References () https://git.kernel.org/stable/c/b29a2f1dd33ae9b94821ab2f4d398b9081786748 - () https://git.kernel.org/stable/c/b29a2f1dd33ae9b94821ab2f4d398b9081786748 - Patch
References () https://git.kernel.org/stable/c/ca765257feb89dacf604ced9cd233db5f865dee0 - () https://git.kernel.org/stable/c/ca765257feb89dacf604ced9cd233db5f865dee0 - Patch
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux
Linux linux Kernel
CWE CWE-401

04 Oct 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-10-04 16:15

Updated : 2026-01-23 16:37


NVD link : CVE-2022-50474

Mitre link : CVE-2022-50474

CVE.ORG link : CVE-2022-50474


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-401

Missing Release of Memory after Effective Lifetime