{"id":"CVE-2022-50566","summary":"mtd: Fix device name leak when register device failed in add_mtd_device()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nmtd: Fix device name leak when register device failed in add_mtd_device()\n\nThere is a kmemleak when register device failed:\n  unreferenced object 0xffff888101aab550 (size 8):\n    comm \"insmod\", pid 3922, jiffies 4295277753 (age 925.408s)\n    hex dump (first 8 bytes):\n      6d 74 64 30 00 88 ff ff                          mtd0....\n    backtrace:\n      [\u003c00000000bde26724\u003e] __kmalloc_node_track_caller+0x4e/0x150\n      [\u003c000000003c32b416\u003e] kvasprintf+0xb0/0x130\n      [\u003c000000001f7a8f15\u003e] kobject_set_name_vargs+0x2f/0xb0\n      [\u003c000000006e781163\u003e] dev_set_name+0xab/0xe0\n      [\u003c00000000e30d0c78\u003e] add_mtd_device+0x4bb/0x700\n      [\u003c00000000f3d34de7\u003e] mtd_device_parse_register+0x2ac/0x3f0\n      [\u003c00000000c0d88488\u003e] 0xffffffffa0238457\n      [\u003c00000000b40d0922\u003e] 0xffffffffa02a008f\n      [\u003c0000000023d17b9d\u003e] do_one_initcall+0x87/0x2a0\n      [\u003c00000000770f6ca6\u003e] do_init_module+0xdf/0x320\n      [\u003c000000007b6768fe\u003e] load_module+0x2f98/0x3330\n      [\u003c00000000346bed5a\u003e] __do_sys_finit_module+0x113/0x1b0\n      [\u003c00000000674c2290\u003e] do_syscall_64+0x35/0x80\n      [\u003c000000004c6a8d97\u003e] entry_SYSCALL_64_after_hwframe+0x46/0xb0\n\nIf register device failed, should call put_device() to give up the\nreference.","modified":"2026-05-18T05:55:52.089335950Z","published":"2025-10-22T13:23:23.917Z","related":["SUSE-SU-2025:4111-1","SUSE-SU-2025:4139-1","SUSE-SU-2025:4149-1","SUSE-SU-2025:4320-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50566.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/1b172fb05d6315ecec082fd7544a3390e96f0d7e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/2302e2dc42b1f84f951c725ce742fc21c5a1e151"},{"type":"WEB","url":"https://git.kernel.org/stable/c/330bc5533e8a8ed69cb951d5a8edce9bddb9db21"},{"type":"WEB","url":"https://git.kernel.org/stable/c/71212d73184845c944ef1b43f092e643e5bde003"},{"type":"WEB","url":"https://git.kernel.org/stable/c/895d68a39481a75c680aa421546931fb11942fa6"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a75f45afa932bfb24a2603ebcea5efd2e7cdcfd6"},{"type":"WEB","url":"https://git.kernel.org/stable/c/bcabe1dc2a344adbb3382930a23e273ba9382277"},{"type":"WEB","url":"https://git.kernel.org/stable/c/db07fe76df01f40cb897d6e9066b84e46957beb3"},{"type":"WEB","url":"https://git.kernel.org/stable/c/fa0d32ab8407d7481450c664fd0de64f2dae9489"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50566.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50566"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"1f24b5a8ecbb2a3c7080f418974d40e3ffedb221"},{"fixed":"a75f45afa932bfb24a2603ebcea5efd2e7cdcfd6"},{"fixed":"2302e2dc42b1f84f951c725ce742fc21c5a1e151"},{"fixed":"db07fe76df01f40cb897d6e9066b84e46957beb3"},{"fixed":"fa0d32ab8407d7481450c664fd0de64f2dae9489"},{"fixed":"330bc5533e8a8ed69cb951d5a8edce9bddb9db21"},{"fixed":"71212d73184845c944ef1b43f092e643e5bde003"},{"fixed":"1b172fb05d6315ecec082fd7544a3390e96f0d7e"},{"fixed":"bcabe1dc2a344adbb3382930a23e273ba9382277"},{"fixed":"895d68a39481a75c680aa421546931fb11942fa6"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50566.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"2.6.30"},{"fixed":"4.9.337"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.10.0"},{"fixed":"4.14.303"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.15.0"},{"fixed":"4.19.270"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.20.0"},{"fixed":"5.4.229"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.5.0"},{"fixed":"5.10.163"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.86"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.0.16"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.1.0"},{"fixed":"6.1.2"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50566.json"}}],"schema_version":"1.7.5"}