CVE-2022-50349

Source
https://cve.org/CVERecord?id=CVE-2022-50349
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50349.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-50349
Downstream
Related
Published
2025-09-16T16:11:41.340Z
Modified
2026-03-20T11:47:24.430032Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
misc: tifm: fix possible memory leak in tifm_7xx1_switch_media()
Details

In the Linux kernel, the following vulnerability has been resolved:

misc: tifm: fix possible memory leak in tifm7xx1switch_media()

If deviceregister() returns error in tifm7xx1switchmedia(), name of kobject which is allocated in devsetname() called in device_add() is leaked.

Never directly free @dev after calling deviceregister(), even if it returned an error! Always use putdevice() to give up the reference initialized.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50349.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
2428a8fe2261e901e058d9ea8b6ed7e1b4268b79
Fixed
2bbb222a54ff501f77ce593d21b76b79c905045e
Fixed
d861b7d41b17942b337d4b87a70de7cd1dc44d4e
Fixed
1695b1adcc3a7d985cd22fa3b55761edf3fab50d
Fixed
ee2715faf7e7153f5142ed09aacfa89a64d45dcb
Fixed
57c857353d5020bdec8284d9c0fee447484fe5e0
Fixed
848c45964ded537107e010aaf353aa30a0855387
Fixed
35abbc8406cc39e72d3ce85f6e869555afe50d54
Fixed
ef843ee20576039126d34d6eb5f45d14c3e6ce18
Fixed
fd2c930cf6a5b9176382c15f9acb1996e76e25ad

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50349.json"