CVE-2022-50298
BaseFortify
Publication date: 2025-09-15
Last updated on: 2025-12-04
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.11 (inc) to 5.15.75 (exc) |
| linux | linux_kernel | From 5.16 (inc) to 5.19.17 (exc) |
| linux | linux_kernel | From 6.0 (inc) to 6.0.3 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the Linux kernel's slimbus qcom-ngd driver where the probe() function did not properly clean up resources in the error path. This caused warnings related to a notifier callback being registered multiple times, which indicates improper handling of resource allocation and cleanup during device initialization.
How can this vulnerability impact me? :
The impact of this vulnerability is primarily related to stability and reliability of the Linux kernel during device initialization. Improper cleanup in the probe error path can lead to warnings and potentially resource leaks or inconsistent states, which might affect system stability or cause unexpected behavior during hardware initialization.