CVE-2022-50477
- Published: 2025-10-04T16:15:44.300
In the Linux kernel, the following vulnerability has been resolved:
rtc: class: Fix potential memleak in devm_rtc_allocate_device()
devm_rtc_allocate_device() will alloc a rtc_device first, and then run
dev_set_name(). If dev_set_name() failed, the rtc_device will memleak.
Move devm_add_action_or_reset() in front of dev_set_name() to prevent
memleak.
unreferenced object 0xffff888110a53000 (size 2048):
comm “python3”, pid 470, jiffies 4296078308 (age 58.882s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 08 30 a5 10 81 88 ff ff ………0……
08 30 a5 10 81 88 ff ff 00 00 00 00 00 00 00 00 .0…………..
backtrace:
[] kmalloc_trace+0x21/0x110
[] devm_rtc_allocate_device+0xd4/0x400
[] devm_rtc_device_register+0x1a/0x80
[] rx4581_probe+0xdd/0x110 [rtc_rx4581]
[] spi_probe+0xde/0x130
[] really_probe+0x175/0x3f0
[] __driver_probe_device+0xe6/0x170
[] device_driver_attach+0x32/0x80
[] bind_store+0x10b/0x1a0
[] drv_attr_store+0x49/0x70
[] sysfs_kf_write+0x8d/0xb0
[] kernfs_fop_write_iter+0x214/0x2d0
[] vfs_write+0x61a/0x7d0
[] ksys_write+0xc8/0x190
[] do_syscall_64+0x37/0x90
[] entry_SYSCALL_64_after_hwframe+0x63/0xcd
Related CVE by CWE
No related CWE found.
Top CVE for Vendor
No vendor taxonomy on this entry.
Recently Exploited Similar Vulnerabilities
No recent KEV-listed items for this vendor/product.
How to fix CVE-2022-50477
Description: In the Linux kernel, the following vulnerability has been resolved: rtc: class: Fix potential memleak in devm_rtc_allocate_device() devm_rtc_allocate_device() will alloc a rtc_device first, and then run dev_set_name(). If dev_set_name() failed, the rtc_device will memleak. Move devm_add_action_or_reset() in front of dev_set_name() to prevent memleak. unreferenced object 0xffff888110a53000 (size 2048): comm “python3”, pid 470, jiffies 4296078308 (age […]
Exploit Difficulty: HARD
⏱️ Time to exploit: > 4 hours
🛠️ Required skills: Advanced security expertise
💰 Public exploits: Rare or not public
How to Fix:
- Check if you're running the affected product
- Update to the latest patched version
- If patching is not immediately possible: restrict network exposure, apply least-privilege access
- Test the fix in a staging environment first
- Review logs for signs of exploitation
- Monitor for IOCs (Indicators of Compromise)
- Enable automatic security updates
- Set up vulnerability monitoring
- Review and harden security configurations
Exploit Difficulty Assessment
Vulnerability Timeline
CVE details first published to NVD database
Added to this CVE tracking system
Detection Rules & IOCs
No specific detection rules generated for this vulnerability type.
No vendor/product data available.