CVE-2022-50522

Source
https://cve.org/CVERecord?id=CVE-2022-50522
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50522.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-50522
Downstream
Published
2025-10-07T15:19:15.923Z
Modified
2026-04-02T08:28:34.497606Z
Summary
mcb: mcb-parse: fix error handing in chameleon_parse_gdd()
Details

In the Linux kernel, the following vulnerability has been resolved:

mcb: mcb-parse: fix error handing in chameleonparsegdd()

If mcbdeviceregister() returns error in chameleonparsegdd(), the refcount of bus and device name are leaked. Fix this by calling putdevice() to give up the reference, so they can be released in mcbreleasedev() and kobjectcleanup().

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50522.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
3764e82e5150d87b205c10cd78a9c9ab86fbfa51
Fixed
891f606ae0765bc9ca99f5276735be4d338f0255
Fixed
cf6e70c0ced50b52415ac0c88eba1fb09c500a5a
Fixed
fd85ece416fd7edb945203e59d4cd94952f77e7c
Fixed
110dc34c9fa33d37f55b394b1199ea6c0ad1ee84
Fixed
7b289b791a59386dc23a00d3cf17a0db984b40d3
Fixed
43bfc7c2402a22d3b4eb08c040f274ba2b76461a
Fixed
b948baa29394ec5f4e6ec28486e7d06a76caee91
Fixed
4a9f1a8b3af287581ffb690d0e1593c681729ddb
Fixed
728ac3389296caf68638628c987aeae6c8851e2d

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50522.json"