{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2022-50462","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2025-10-01T11:38:45.641Z","datePublished":"2025-10-01T11:45:34.107Z","dateUpdated":"2026-05-11T19:19:55.430Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T19:19:55.430Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nMIPS: vpe-mt: fix possible memory leak while module exiting\n\nAfer commit 1fa5ae857bb1 (\"driver core: get rid of struct device's\nbus_id string array\"), the name of device is allocated dynamically,\nit need be freed when module exiting, call put_device() to give up\nreference, so that it can be freed in kobject_cleanup() when the\nrefcount hit to 0. The vpe_device is static, so remove kfree() from\nvpe_device_release()."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["arch/mips/kernel/vpe-mt.c"],"versions":[{"version":"1fa5ae857bb14f6046205171d98506d8112dd74e","lessThan":"170e9913c2ed5cfc37c0adf0fdbd368d2d8d8168","status":"affected","versionType":"git"},{"version":"1fa5ae857bb14f6046205171d98506d8112dd74e","lessThan":"9d180e0bb21c57bd6cca2adeb672d3b522e910b5","status":"affected","versionType":"git"},{"version":"1fa5ae857bb14f6046205171d98506d8112dd74e","lessThan":"851ae5640875f06494e40002cd503b11a634c6fb","status":"affected","versionType":"git"},{"version":"1fa5ae857bb14f6046205171d98506d8112dd74e","lessThan":"b3325a443525e3b89151879b834519b21c5e3011","status":"affected","versionType":"git"},{"version":"1fa5ae857bb14f6046205171d98506d8112dd74e","lessThan":"48d42f4464d713fbdd79f334fdcd6e5be534cc67","status":"affected","versionType":"git"},{"version":"1fa5ae857bb14f6046205171d98506d8112dd74e","lessThan":"e820a8192ff68570100347855b567512aec43819","status":"affected","versionType":"git"},{"version":"1fa5ae857bb14f6046205171d98506d8112dd74e","lessThan":"b191dde84e40624d5577f64db0ec922c5c0ec57c","status":"affected","versionType":"git"},{"version":"1fa5ae857bb14f6046205171d98506d8112dd74e","lessThan":"ab3d47c1fd0202821abd473ca87580faafd47847","status":"affected","versionType":"git"},{"version":"1fa5ae857bb14f6046205171d98506d8112dd74e","lessThan":"5822e8cc84ee37338ab0bdc3124f6eec04dc232d","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["arch/mips/kernel/vpe-mt.c"],"versions":[{"version":"2.6.30","status":"affected"},{"version":"0","lessThan":"2.6.30","status":"unaffected","versionType":"semver"},{"version":"4.9.337","lessThanOrEqual":"4.9.*","status":"unaffected","versionType":"semver"},{"version":"4.14.303","lessThanOrEqual":"4.14.*","status":"unaffected","versionType":"semver"},{"version":"4.19.270","lessThanOrEqual":"4.19.*","status":"unaffected","versionType":"semver"},{"version":"5.4.229","lessThanOrEqual":"5.4.*","status":"unaffected","versionType":"semver"},{"version":"5.10.163","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.86","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.0.16","lessThanOrEqual":"6.0.*","status":"unaffected","versionType":"semver"},{"version":"6.1.2","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.2","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.30","versionEndExcluding":"4.9.337"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.30","versionEndExcluding":"4.14.303"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.30","versionEndExcluding":"4.19.270"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.30","versionEndExcluding":"5.4.229"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.30","versionEndExcluding":"5.10.163"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.30","versionEndExcluding":"5.15.86"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.30","versionEndExcluding":"6.0.16"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.30","versionEndExcluding":"6.1.2"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.30","versionEndExcluding":"6.2"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/170e9913c2ed5cfc37c0adf0fdbd368d2d8d8168"},{"url":"https://git.kernel.org/stable/c/9d180e0bb21c57bd6cca2adeb672d3b522e910b5"},{"url":"https://git.kernel.org/stable/c/851ae5640875f06494e40002cd503b11a634c6fb"},{"url":"https://git.kernel.org/stable/c/b3325a443525e3b89151879b834519b21c5e3011"},{"url":"https://git.kernel.org/stable/c/48d42f4464d713fbdd79f334fdcd6e5be534cc67"},{"url":"https://git.kernel.org/stable/c/e820a8192ff68570100347855b567512aec43819"},{"url":"https://git.kernel.org/stable/c/b191dde84e40624d5577f64db0ec922c5c0ec57c"},{"url":"https://git.kernel.org/stable/c/ab3d47c1fd0202821abd473ca87580faafd47847"},{"url":"https://git.kernel.org/stable/c/5822e8cc84ee37338ab0bdc3124f6eec04dc232d"}],"title":"MIPS: vpe-mt: fix possible memory leak while module exiting","x_generator":{"engine":"bippy-1.2.0"}}}}