Home

Description

In the Linux kernel, the following vulnerability has been resolved: net: ethernet: mtk_eth_soc: fix possible memory leak in mtk_probe() If mtk_wed_add_hw() has been called, mtk_wed_exit() needs be called in error path or removing module to free the memory allocated in mtk_wed_add_hw().

PUBLISHED Reserved 2025-12-24 | Published 2025-12-24 | Updated 2025-12-24 | Assigner Linux

Product status

Default status
unaffected

804775dfc2885e93a0a4b35db1914c2cc25172b5 (git) before 96bde7c4f5683d8c1c809ddb781ef3fdec9b7215
affected

804775dfc2885e93a0a4b35db1914c2cc25172b5 (git) before b3d0d98179d62f9d55635a600679c4fa362baf8d
affected

Default status
affected

5.19
affected

Any version before 5.19
unaffected

6.0.6 (semver)
unaffected

6.1 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/96bde7c4f5683d8c1c809ddb781ef3fdec9b7215

git.kernel.org/...c/b3d0d98179d62f9d55635a600679c4fa362baf8d

cve.org (CVE-2022-50711)

nvd.nist.gov (CVE-2022-50711)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.