VYPR
Unrated severityNVD Advisory· Published Dec 30, 2025· Updated Apr 15, 2026

CVE-2022-50848

CVE-2022-50848

Description

In the Linux kernel, the following vulnerability has been resolved:

drivers: dio: fix possible memory leak in dio_init()

If device_register() returns error, the 'dev' and name needs be freed. Add a release function, and then call put_device() in the error path, so the name is freed in kobject_cleanup() and to the 'dev' is freed in release function.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Memory leak in Linux kernel's dio_init() when device_register() fails, fixed by adding proper cleanup.

Root

Cause In dio_init(), if device_register() returns an error, the allocated dev and its name are not freed, resulting in a memory leak. The fix adds a release function and calls put_device() in the error path to properly release resources.

Exploitation

This vulnerability is local in nature and exploitable only if a device registration failure occurs during DIO bus initialization. An attacker with local access or ability to influence hardware configuration could potentially trigger the failure condition, causing repeated leaks.

Impact

The memory leak gradually exhausts kernel memory, which can lead to system instability, denial of service, or resource exhaustion. No privilege escalation or code execution is reported.

Mitigation

The issue has been patched in stable kernel releases, as seen in commit [1]. Users should update their kernels to include the fix.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

9

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

9

News mentions

0

No linked articles in our index yet.