{"id":"CVE-2022-50813","summary":"drivers: mcb: fix resource leak in mcb_probe()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\ndrivers: mcb: fix resource leak in mcb_probe()\n\nWhen probe hook function failed in mcb_probe(), it doesn't put the device.\nCompiled test only.","modified":"2026-04-02T08:28:46.641492Z","published":"2025-12-30T12:08:30.164Z","database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50813.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/0468a585710bbb807a1b9c31df54bcf564d28b2b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/0a23dda78946f604ff752fe223c3c1f4fa6dd7b4"},{"type":"WEB","url":"https://git.kernel.org/stable/c/0d1c2c8db28919c4351000d7c1692f1767bdc4f7"},{"type":"WEB","url":"https://git.kernel.org/stable/c/531ac7b911a962b3b29565dad6ea6b5c3fad3317"},{"type":"WEB","url":"https://git.kernel.org/stable/c/68e54d9ee8222d7805a0b9d3e1c37b8cf3be536a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/6f3467aa5712e6b5550e75a16454b3f17aa1f380"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d7237462561fcd224fa687c56ccb68629f50fc0d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e420ca85bf42a684ea729c505c07de6709500ed2"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f3686e5e8de0a03c8e70e3ee0ce3078fed612909"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50813.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50813"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"7bc364097a89a0a9a5e5e4989d6b3e6fb2027a9e"},{"fixed":"531ac7b911a962b3b29565dad6ea6b5c3fad3317"},{"fixed":"6f3467aa5712e6b5550e75a16454b3f17aa1f380"},{"fixed":"e420ca85bf42a684ea729c505c07de6709500ed2"},{"fixed":"68e54d9ee8222d7805a0b9d3e1c37b8cf3be536a"},{"fixed":"0d1c2c8db28919c4351000d7c1692f1767bdc4f7"},{"fixed":"f3686e5e8de0a03c8e70e3ee0ce3078fed612909"},{"fixed":"0a23dda78946f604ff752fe223c3c1f4fa6dd7b4"},{"fixed":"0468a585710bbb807a1b9c31df54bcf564d28b2b"},{"fixed":"d7237462561fcd224fa687c56ccb68629f50fc0d"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50813.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"4.7.0"},{"fixed":"4.9.337"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.10.0"},{"fixed":"4.14.303"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.15.0"},{"fixed":"4.19.270"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.20.0"},{"fixed":"5.4.229"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.5.0"},{"fixed":"5.10.163"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.86"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.0.16"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.1.0"},{"fixed":"6.1.2"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50813.json"}}],"schema_version":"1.7.5"}