CVE-2022-50499

In the Linux kernel, the following vulnerability has been resolved: media: dvb-core: Fix double free in dvb_register_device() In function dvb_register_device() -> dvb_register_media_device() -> dvb_create_media_entity(), dvb->entity is allocated and initialized. If the initialization fails, it frees the dvb->entity, and return an error code. The caller takes the error code and handles the error by calling dvb_media_device_free(), which unregisters the entity and frees the field again if it is not NULL. As dvb->entity may not NULLed in dvb_create_media_entity() when the allocation of dvbdev->pad fails, a double free may occur. This may also cause an Use After free in media_device_unregister_entity(). Fix this by storing NULL to dvb->entity when it is freed.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

22 Jan 2026, 19:57

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/0588b12c418c3e4f927ced11f27b02ef4a5bfb07 - () https://git.kernel.org/stable/c/0588b12c418c3e4f927ced11f27b02ef4a5bfb07 - Patch
References () https://git.kernel.org/stable/c/123eddf92a114e03919942641d2c2b1f4ca56ea6 - () https://git.kernel.org/stable/c/123eddf92a114e03919942641d2c2b1f4ca56ea6 - Patch
References () https://git.kernel.org/stable/c/6b0d0477fce747d4137aa65856318b55fba72198 - () https://git.kernel.org/stable/c/6b0d0477fce747d4137aa65856318b55fba72198 - Patch
References () https://git.kernel.org/stable/c/70bc51303871159796b55ba1a8f16637b46c2511 - () https://git.kernel.org/stable/c/70bc51303871159796b55ba1a8f16637b46c2511 - Patch
References () https://git.kernel.org/stable/c/772892b29ac50c2c5e918fc80104aa6ede81d837 - () https://git.kernel.org/stable/c/772892b29ac50c2c5e918fc80104aa6ede81d837 - Patch
References () https://git.kernel.org/stable/c/7dd5a68cdbbbe7fc67ba701cb52ba10d8ba149f8 - () https://git.kernel.org/stable/c/7dd5a68cdbbbe7fc67ba701cb52ba10d8ba149f8 - Patch
References () https://git.kernel.org/stable/c/acf984a3718c2458eb9e08b6714490a04f213c58 - () https://git.kernel.org/stable/c/acf984a3718c2458eb9e08b6714490a04f213c58 - Patch
References () https://git.kernel.org/stable/c/b21f62b49ee9c3e0216d685d9cfd6003e5727271 - () https://git.kernel.org/stable/c/b21f62b49ee9c3e0216d685d9cfd6003e5727271 - Patch
References () https://git.kernel.org/stable/c/e9a78485b658361fab6a5547377be6c1af6f1b3d - () https://git.kernel.org/stable/c/e9a78485b658361fab6a5547377be6c1af6f1b3d - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
First Time Linux
Linux linux Kernel
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE CWE-415

04 Oct 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-10-04 16:15

Updated : 2026-01-22 19:57


NVD link : CVE-2022-50499

Mitre link : CVE-2022-50499

CVE.ORG link : CVE-2022-50499


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-415

Double Free