CVE-2022-50711
Description
In the Linux kernel, the following vulnerability has been resolved:
net: ethernet: mtk_eth_soc: fix possible memory leak in mtk_probe()
If mtk_wed_add_hw() has been called, mtk_wed_exit() needs be called in error path or removing module to free the memory allocated in mtk_wed_add_hw().
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A memory leak in the Linux kernel's mtk_eth_soc driver occurs when mtk_wed_add_hw() succeeds but the error path fails to call mtk_wed_exit().
Vulnerability
Analysis
In the Linux kernel's MediaTek Ethernet SoC driver (mtk_eth_soc), a memory leak vulnerability exists in the mtk_probe() function. The root cause is that when mtk_wed_add_hw() is successfully called during probe, the corresponding cleanup function mtk_wed_exit() is not invoked in error paths or during module removal. This omission leads to memory allocated by mtk_wed_add_hw() being leaked [1].
Exploitation and
Impact
An attacker cannot directly trigger this vulnerability from user space; it is a resource leak that occurs during driver initialization or removal. The attack surface is limited to scenarios where the driver is loaded or unloaded, such as system boot or module insertion/removal of the kernel module. No authentication or special privileges are required to trigger the leak, but the impact is primarily a gradual depletion of kernel memory, which could lead to denial of service over time if the driver is repeatedly probed or removed [1].
Mitigation
The fix is included in Linux kernel stable updates. The commit referenced ensures that mtk_wed_exit() is called in all error paths after a successful `mtk_wed_add_hw() call, and also during module removal. Users should update to a kernel version containing this fix [1].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2Patches
296bde7c4f568b3d0d98179d6Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
2News mentions
0No linked articles in our index yet.