๐Ÿ” CVE Alert

CVE-2022-50462

UNKNOWN 0.0

MIPS: vpe-mt: fix possible memory leak while module exiting

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: MIPS: vpe-mt: fix possible memory leak while module exiting Afer commit 1fa5ae857bb1 ("driver core: get rid of struct device's bus_id string array"), the name of device is allocated dynamically, it need be freed when module exiting, call put_device() to give up reference, so that it can be freed in kobject_cleanup() when the refcount hit to 0. The vpe_device is static, so remove kfree() from vpe_device_release().

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Oct 1, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
1fa5ae857bb14f6046205171d98506d8112dd74e < 170e9913c2ed5cfc37c0adf0fdbd368d2d8d8168 1fa5ae857bb14f6046205171d98506d8112dd74e < 9d180e0bb21c57bd6cca2adeb672d3b522e910b5 1fa5ae857bb14f6046205171d98506d8112dd74e < 851ae5640875f06494e40002cd503b11a634c6fb 1fa5ae857bb14f6046205171d98506d8112dd74e < b3325a443525e3b89151879b834519b21c5e3011 1fa5ae857bb14f6046205171d98506d8112dd74e < 48d42f4464d713fbdd79f334fdcd6e5be534cc67 1fa5ae857bb14f6046205171d98506d8112dd74e < e820a8192ff68570100347855b567512aec43819 1fa5ae857bb14f6046205171d98506d8112dd74e < b191dde84e40624d5577f64db0ec922c5c0ec57c 1fa5ae857bb14f6046205171d98506d8112dd74e < ab3d47c1fd0202821abd473ca87580faafd47847 1fa5ae857bb14f6046205171d98506d8112dd74e < 5822e8cc84ee37338ab0bdc3124f6eec04dc232d
Linux / Linux
2.6.30

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/170e9913c2ed5cfc37c0adf0fdbd368d2d8d8168 git.kernel.org: https://git.kernel.org/stable/c/9d180e0bb21c57bd6cca2adeb672d3b522e910b5 git.kernel.org: https://git.kernel.org/stable/c/851ae5640875f06494e40002cd503b11a634c6fb git.kernel.org: https://git.kernel.org/stable/c/b3325a443525e3b89151879b834519b21c5e3011 git.kernel.org: https://git.kernel.org/stable/c/48d42f4464d713fbdd79f334fdcd6e5be534cc67 git.kernel.org: https://git.kernel.org/stable/c/e820a8192ff68570100347855b567512aec43819 git.kernel.org: https://git.kernel.org/stable/c/b191dde84e40624d5577f64db0ec922c5c0ec57c git.kernel.org: https://git.kernel.org/stable/c/ab3d47c1fd0202821abd473ca87580faafd47847 git.kernel.org: https://git.kernel.org/stable/c/5822e8cc84ee37338ab0bdc3124f6eec04dc232d