CVE-2022-50119
BaseFortify
Publication date: 2025-06-18
Last updated on: 2025-11-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-Other |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a reference count leak in the Linux kernel's rpmsg subsystem, specifically in the function rpmsg_register_device_override(). When the driver_set_override function fails, the code does not properly call put_device() to free the associated device structure, leading to a potential resource leak. The fix involves adding a put_device() call in the error handling path to prevent this leak.
How can this vulnerability impact me? :
The impact of this vulnerability is a possible resource leak in the Linux kernel, which could lead to increased memory usage or resource exhaustion over time. This might degrade system performance or stability, especially in systems that frequently trigger this code path.