CVE-2022-50578
BaseFortify
Publication date: 2025-10-22
Last updated on: 2025-10-22
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a possible memory leak in the Linux kernel function __class_register(). When the function class_add_groups() returns an error, certain cleanup steps are required to unregister and free memory associated with 'cp->subsys' and 'cp'. However, the existing code could cause a double free error if kset_unregister() is called, because the object 'cls' is freed both in a callback and in the caller's error path. The fix involves calling kobject_del() and kfree_const(name) to clean up the kobject, and calling kfree() to free 'cp', preventing memory leaks and double free errors.
How can this vulnerability impact me? :
This vulnerability can lead to memory leaks or double free errors in the Linux kernel, which may cause system instability, crashes, or potential security risks such as denial of service. Improper memory management in kernel code can affect the reliability and security of the system.