{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2022-50110","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2025-06-18T10:57:27.414Z","datePublished":"2025-06-18T11:02:43.370Z","dateUpdated":"2026-05-11T19:13:02.065Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T19:13:02.065Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nwatchdog: sp5100_tco: Fix a memory leak of EFCH MMIO resource\n\nUnlike release_mem_region(), a call to release_resource() does not\nfree the resource, so it has to be freed explicitly to avoid a memory\nleak."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/watchdog/sp5100_tco.c"],"versions":[{"version":"b4c0f1600df43245c8c3425dbd9426fdfba6c4b2","lessThan":"84ddf527f90755beec6b55ce2e31331f5ccd4e37","status":"affected","versionType":"git"},{"version":"0578fff4aae5bce3f09875f58e68e9ffbab8daf5","lessThan":"3a1becb1f13268ef58f19190608a7c742fb6fcf5","status":"affected","versionType":"git"},{"version":"0578fff4aae5bce3f09875f58e68e9ffbab8daf5","lessThan":"ee1fb8f75abe361413913e3a6e93c8c0a4d83cd9","status":"affected","versionType":"git"},{"version":"0578fff4aae5bce3f09875f58e68e9ffbab8daf5","lessThan":"c6d9c0798ed366a09a9e53d71edcd2266e34a6eb","status":"affected","versionType":"git"},{"version":"15b5d74600b98adf396d416ed59e0d43726f2671","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/watchdog/sp5100_tco.c"],"versions":[{"version":"5.18","status":"affected"},{"version":"0","lessThan":"5.18","status":"unaffected","versionType":"semver"},{"version":"5.15.61","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"5.18.18","lessThanOrEqual":"5.18.*","status":"unaffected","versionType":"semver"},{"version":"5.19.2","lessThanOrEqual":"5.19.*","status":"unaffected","versionType":"semver"},{"version":"6.0","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.15.42","versionEndExcluding":"5.15.61"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.18","versionEndExcluding":"5.18.18"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.18","versionEndExcluding":"5.19.2"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.18","versionEndExcluding":"6.0"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.17.10"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/84ddf527f90755beec6b55ce2e31331f5ccd4e37"},{"url":"https://git.kernel.org/stable/c/3a1becb1f13268ef58f19190608a7c742fb6fcf5"},{"url":"https://git.kernel.org/stable/c/ee1fb8f75abe361413913e3a6e93c8c0a4d83cd9"},{"url":"https://git.kernel.org/stable/c/c6d9c0798ed366a09a9e53d71edcd2266e34a6eb"}],"title":"watchdog: sp5100_tco: Fix a memory leak of EFCH MMIO resource","x_generator":{"engine":"bippy-1.2.0"}}}}