VYPR
Unrated severityNVD Advisory· Published Dec 24, 2025· Updated Apr 15, 2026

CVE-2022-50711

CVE-2022-50711

Description

In the Linux kernel, the following vulnerability has been resolved:

net: ethernet: mtk_eth_soc: fix possible memory leak in mtk_probe()

If mtk_wed_add_hw() has been called, mtk_wed_exit() needs be called in error path or removing module to free the memory allocated in mtk_wed_add_hw().

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A memory leak in the Linux kernel's mtk_eth_soc driver occurs when mtk_wed_add_hw() succeeds but the error path fails to call mtk_wed_exit().

Vulnerability

Analysis

In the Linux kernel's MediaTek Ethernet SoC driver (mtk_eth_soc), a memory leak vulnerability exists in the mtk_probe() function. The root cause is that when mtk_wed_add_hw() is successfully called during probe, the corresponding cleanup function mtk_wed_exit() is not invoked in error paths or during module removal. This omission leads to memory allocated by mtk_wed_add_hw() being leaked [1].

Exploitation and

Impact

An attacker cannot directly trigger this vulnerability from user space; it is a resource leak that occurs during driver initialization or removal. The attack surface is limited to scenarios where the driver is loaded or unloaded, such as system boot or module insertion/removal of the kernel module. No authentication or special privileges are required to trigger the leak, but the impact is primarily a gradual depletion of kernel memory, which could lead to denial of service over time if the driver is repeatedly probed or removed [1].

Mitigation

The fix is included in Linux kernel stable updates. The commit referenced ensures that mtk_wed_exit() is called in all error paths after a successful `mtk_wed_add_hw() call, and also during module removal. Users should update to a kernel version containing this fix [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

2

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

2

News mentions

0

No linked articles in our index yet.