CVE-2022-50522
BaseFortify
Publication date: 2025-10-07
Last updated on: 2026-03-17
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 4.10 (inc) to 4.14.303 (inc) |
| mcb | mcb_parse | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is in the Linux kernel's mcb component, specifically in the mcb-parse function chameleon_parse_gdd(). When the function mcb_device_register() returns an error, the reference counts for the bus and device name are not properly released, causing a reference count leak. The fix involves calling put_device() to release these references so they can be properly cleaned up later.
How can this vulnerability impact me? :
The vulnerability causes a reference count leak in the Linux kernel, which can lead to resource leaks. Over time, this may result in increased memory usage or resource exhaustion, potentially affecting system stability or performance.