CVE-2022-50848Missing Release of Memory after Effective Lifetime in Linux

7 documents6 sources
Severity
N/A
No vector
EPSS
0.0%
top 84.94%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 30

Description

In the Linux kernel, the following vulnerability has been resolved: drivers: dio: fix possible memory leak in dio_init() If device_register() returns error, the 'dev' and name needs be freed. Add a release function, and then call put_device() in the error path, so the name is freed in kobject_cleanup() and to the 'dev' is freed in release function.

Affected Packages4 packages

Linuxlinux/linux_kernel2.6.294.9.337+7
Debianlinux/linux_kernel< 5.10.178-1+3
CVEListV5linux/linux2e4c77bea3d8b17d94f8ee382411f359b708560faffe3cea6b3148fa66796a48640664822ceccd48+9
debiandebian/linux< linux 6.1.4-1 (bookworm)

🔴Vulnerability Details

3
GHSA
GHSA-82rq-cj65-cv9p: In the Linux kernel, the following vulnerability has been resolved: drivers: dio: fix possible memory leak in dio_init() If device_register() return2025-12-30
OSV
drivers: dio: fix possible memory leak in dio_init()2025-12-30
OSV
CVE-2022-50848: In the Linux kernel, the following vulnerability has been resolved: drivers: dio: fix possible memory leak in dio_init() If device_register() returns2025-12-30

📋Vendor Advisories

2
Red Hat
kernel: drivers: dio: fix possible memory leak in dio_init()2025-12-30
Debian
CVE-2022-50848: linux - In the Linux kernel, the following vulnerability has been resolved: drivers: di...2022

🕵️Threat Intelligence

1
Wiz
CVE-2022-50848 Impact, Exploitability, and Mitigation Steps | Wiz