U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2022-50462 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: MIPS: vpe-mt: fix possible memory leak while module exiting Afer commit 1fa5ae857bb1 ("driver core: get rid of struct device's bus_id string array"), the name of device is allocated dynamically, it need be freed when module exiting, call put_device() to give up reference, so that it can be freed in kobject_cleanup() when the refcount hit to 0. The vpe_device is static, so remove kfree() from vpe_device_release().


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

URL Source(s) Tag(s)
https://git.kernel.org/stable/c/170e9913c2ed5cfc37c0adf0fdbd368d2d8d8168 kernel.org
https://git.kernel.org/stable/c/48d42f4464d713fbdd79f334fdcd6e5be534cc67 kernel.org
https://git.kernel.org/stable/c/5822e8cc84ee37338ab0bdc3124f6eec04dc232d kernel.org
https://git.kernel.org/stable/c/851ae5640875f06494e40002cd503b11a634c6fb kernel.org
https://git.kernel.org/stable/c/9d180e0bb21c57bd6cca2adeb672d3b522e910b5 kernel.org
https://git.kernel.org/stable/c/ab3d47c1fd0202821abd473ca87580faafd47847 kernel.org
https://git.kernel.org/stable/c/b191dde84e40624d5577f64db0ec922c5c0ec57c kernel.org
https://git.kernel.org/stable/c/b3325a443525e3b89151879b834519b21c5e3011 kernel.org
https://git.kernel.org/stable/c/e820a8192ff68570100347855b567512aec43819 kernel.org

Weakness Enumeration

CWE-ID CWE Name Source

Change History

1 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2022-50462
NVD Published Date:
10/01/2025
NVD Last Modified:
10/01/2025
Source:
kernel.org