CVE-2022-50624
BaseFortify
Publication date: 2025-12-08
Last updated on: 2025-12-08
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is related to error handling in the Linux kernel's network security (netsec) subsystem, specifically in the function netsec_register_mdio(). If certain functions fail during the registration process (phy_device_register() or get_phy_device()), the necessary cleanup functions (phy_device_free() or mdiobus_unregister()) are not called. This leads to resource leaks such as memory not being freed and kernel object (kobject) leaks.
How can this vulnerability impact me? :
The impact of this vulnerability includes potential memory leaks and kernel object leaks in the Linux kernel. This can lead to increased memory usage, possible system instability, or degraded performance over time due to unreleased resources.