CVE-2022-50522

In the Linux kernel, the following vulnerability has been resolved: mcb: mcb-parse: fix error handing in chameleon_parse_gdd() If mcb_device_register() returns error in chameleon_parse_gdd(), the refcount of bus and device name are leaked. Fix this by calling put_device() to give up the reference, so they can be released in mcb_release_dev() and kobject_cleanup().
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

04 Feb 2026, 17:01

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 3.3
References () https://git.kernel.org/stable/c/110dc34c9fa33d37f55b394b1199ea6c0ad1ee84 - () https://git.kernel.org/stable/c/110dc34c9fa33d37f55b394b1199ea6c0ad1ee84 - Patch
References () https://git.kernel.org/stable/c/43bfc7c2402a22d3b4eb08c040f274ba2b76461a - () https://git.kernel.org/stable/c/43bfc7c2402a22d3b4eb08c040f274ba2b76461a - Patch
References () https://git.kernel.org/stable/c/4a9f1a8b3af287581ffb690d0e1593c681729ddb - () https://git.kernel.org/stable/c/4a9f1a8b3af287581ffb690d0e1593c681729ddb - Patch
References () https://git.kernel.org/stable/c/728ac3389296caf68638628c987aeae6c8851e2d - () https://git.kernel.org/stable/c/728ac3389296caf68638628c987aeae6c8851e2d - Patch
References () https://git.kernel.org/stable/c/7b289b791a59386dc23a00d3cf17a0db984b40d3 - () https://git.kernel.org/stable/c/7b289b791a59386dc23a00d3cf17a0db984b40d3 - Patch
References () https://git.kernel.org/stable/c/891f606ae0765bc9ca99f5276735be4d338f0255 - () https://git.kernel.org/stable/c/891f606ae0765bc9ca99f5276735be4d338f0255 - Patch
References () https://git.kernel.org/stable/c/b948baa29394ec5f4e6ec28486e7d06a76caee91 - () https://git.kernel.org/stable/c/b948baa29394ec5f4e6ec28486e7d06a76caee91 - Patch
References () https://git.kernel.org/stable/c/cf6e70c0ced50b52415ac0c88eba1fb09c500a5a - () https://git.kernel.org/stable/c/cf6e70c0ced50b52415ac0c88eba1fb09c500a5a - Patch
References () https://git.kernel.org/stable/c/fd85ece416fd7edb945203e59d4cd94952f77e7c - () https://git.kernel.org/stable/c/fd85ece416fd7edb945203e59d4cd94952f77e7c - Patch
First Time Linux
Linux linux Kernel
CWE NVD-CWE-noinfo

07 Oct 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-10-07 16:15

Updated : 2026-02-04 17:01


NVD link : CVE-2022-50522

Mitre link : CVE-2022-50522

CVE.ORG link : CVE-2022-50522


JSON object : View

Products Affected

linux

  • linux_kernel