CVE-2022-50352

In the Linux kernel, the following vulnerability has been resolved: net: hns: fix possible memory leak in hnae_ae_register() Inject fault while probing module, if device_register() fails, but the refcount of kobject is not decreased to 0, the name allocated in dev_set_name() is leaked. Fix this by calling put_device(), so that name can be freed in callback function kobject_cleanup(). unreferenced object 0xffff00c01aba2100 (size 128): comm "systemd-udevd", pid 1259, jiffies 4294903284 (age 294.152s) hex dump (first 32 bytes): 68 6e 61 65 30 00 00 00 18 21 ba 1a c0 00 ff ff hnae0....!...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<0000000034783f26>] slab_post_alloc_hook+0xa0/0x3e0 [<00000000748188f2>] __kmem_cache_alloc_node+0x164/0x2b0 [<00000000ab0743e8>] __kmalloc_node_track_caller+0x6c/0x390 [<000000006c0ffb13>] kvasprintf+0x8c/0x118 [<00000000fa27bfe1>] kvasprintf_const+0x60/0xc8 [<0000000083e10ed7>] kobject_set_name_vargs+0x3c/0xc0 [<000000000b87affc>] dev_set_name+0x7c/0xa0 [<000000003fd8fe26>] hnae_ae_register+0xcc/0x190 [hnae] [<00000000fe97edc9>] hns_dsaf_ae_init+0x9c/0x108 [hns_dsaf] [<00000000c36ff1eb>] hns_dsaf_probe+0x548/0x748 [hns_dsaf]
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*

History

01 Dec 2025, 21:58

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/02dc0db19d944b4a90941db505ecf1aaec714be4 - () https://git.kernel.org/stable/c/02dc0db19d944b4a90941db505ecf1aaec714be4 - Patch
References () https://git.kernel.org/stable/c/2974f3b330ef25f5d34a4948d04290c2cd7802cf - () https://git.kernel.org/stable/c/2974f3b330ef25f5d34a4948d04290c2cd7802cf - Patch
References () https://git.kernel.org/stable/c/3b78453cca046d3b03853f0d077ad3ad130db886 - () https://git.kernel.org/stable/c/3b78453cca046d3b03853f0d077ad3ad130db886 - Patch
References () https://git.kernel.org/stable/c/7ae1345f6ad715acbcdc9e1ac28153684fd498bb - () https://git.kernel.org/stable/c/7ae1345f6ad715acbcdc9e1ac28153684fd498bb - Patch
References () https://git.kernel.org/stable/c/91f8f5342bee726ed5692583d58f69e7cc9ae60e - () https://git.kernel.org/stable/c/91f8f5342bee726ed5692583d58f69e7cc9ae60e - Patch
References () https://git.kernel.org/stable/c/a3c148955c22fe1d94d7a2096005679c1f22eddf - () https://git.kernel.org/stable/c/a3c148955c22fe1d94d7a2096005679c1f22eddf - Patch
References () https://git.kernel.org/stable/c/dfc0337c6dceb6449403b33ecb141f4a1458a1e9 - () https://git.kernel.org/stable/c/dfc0337c6dceb6449403b33ecb141f4a1458a1e9 - Patch
References () https://git.kernel.org/stable/c/ff2f5ec5d009844ec28f171123f9e58750cef4bf - () https://git.kernel.org/stable/c/ff2f5ec5d009844ec28f171123f9e58750cef4bf - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux linux Kernel
Linux
CWE CWE-401

Information

Published : 2025-09-16 17:15

Updated : 2025-12-01 21:58


NVD link : CVE-2022-50352

Mitre link : CVE-2022-50352

CVE.ORG link : CVE-2022-50352


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-401

Missing Release of Memory after Effective Lifetime