CVE-2022-50813
Description
In the Linux kernel, the following vulnerability has been resolved:
drivers: mcb: fix resource leak in mcb_probe()
When probe hook function failed in mcb_probe(), it doesn't put the device. Compiled test only.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
In the Linux kernel, mcb_probe() fails to release a device reference when a probe hook fails, causing a resource leak.
CVE-2022-50813 is a resource leak vulnerability in the Linux kernel's MCB (Managed Controller Bus) driver. The flaw resides in the mcb_probe() function, which fails to call put_device() when a probe hook callback returns failure. This oversight prevents the device reference count from being decremented, leading to a persistent reference that prevents the device's resources from being freed [1][2][3][4].
The vulnerability is triggered during the device probe process. When the kernel attempts to bind a driver to an MCB device and the driver's probe hook fails, the normal cleanup path is not taken. The missing put_device() call means the device structure retains a reference, preventing proper deallocation. No special privileges or network access are required; local access to the system is sufficient to trigger the condition during normal device enumeration.
An attacker who can repeatedly cause probe failures (for example, by attaching devices that trigger driver probe errors) can exploit this bug to exhaust kernel memory, leading to a denial-of-service (DoS) condition. Repeated exploitation may eventually cause system instability or crashes due to resource starvation.
Patches have been committed to the Linux kernel stable tree, backported to various versions. Users should apply the corresponding stable kernel updates to mitigate the leak [1][2][3][4].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
9531ac7b911a96f3467aa5712e420ca85bf4268e54d9ee8220d1c2c8db289f3686e5e8de00a23dda789460468a585710bd7237462561fVulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
9- git.kernel.org/stable/c/0468a585710bbb807a1b9c31df54bcf564d28b2bnvd
- git.kernel.org/stable/c/0a23dda78946f604ff752fe223c3c1f4fa6dd7b4nvd
- git.kernel.org/stable/c/0d1c2c8db28919c4351000d7c1692f1767bdc4f7nvd
- git.kernel.org/stable/c/531ac7b911a962b3b29565dad6ea6b5c3fad3317nvd
- git.kernel.org/stable/c/68e54d9ee8222d7805a0b9d3e1c37b8cf3be536anvd
- git.kernel.org/stable/c/6f3467aa5712e6b5550e75a16454b3f17aa1f380nvd
- git.kernel.org/stable/c/d7237462561fcd224fa687c56ccb68629f50fc0dnvd
- git.kernel.org/stable/c/e420ca85bf42a684ea729c505c07de6709500ed2nvd
- git.kernel.org/stable/c/f3686e5e8de0a03c8e70e3ee0ce3078fed612909nvd
News mentions
0No linked articles in our index yet.