CVE-2022-50500
- Published: 2025-10-04T16:15:47.153
In the Linux kernel, the following vulnerability has been resolved:
netdevsim: fix memory leak in nsim_drv_probe() when nsim_dev_resources_register() failed
If some items in nsim_dev_resources_register() fail, memory leak will
occur. The following is the memory leak information.
unreferenced object 0xffff888074c02600 (size 128):
comm “echo”, pid 8159, jiffies 4294945184 (age 493.530s)
hex dump (first 32 bytes):
40 47 ea 89 ff ff ff ff 01 00 00 00 00 00 00 00 @G…………..
ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff …………….
backtrace:
[] kmalloc_trace+0x22/0x60
[] devl_resource_register+0x144/0x4e0
[] nsim_drv_probe+0x37a/0x1260
[] really_probe+0x20b/0xb10
[] __driver_probe_device+0x1b3/0x4a0
[] driver_probe_device+0x49/0x140
[] __device_attach_driver+0x18c/0x2a0
[] bus_for_each_drv+0x151/0x1d0
[] __device_attach+0x1c9/0x4e0
[] bus_probe_device+0x1d5/0x280
[] device_add+0xae0/0x1cb0
[] new_device_store+0x3b6/0x5f0
[] bus_attr_store+0x72/0xa0
[] sysfs_kf_write+0x106/0x160
[] kernfs_fop_write_iter+0x3a8/0x5a0
[] vfs_write+0x8f0/0xc80
Related CVE by CWE
No related CWE found.
Top CVE for Vendor
No vendor taxonomy on this entry.
Recently Exploited Similar Vulnerabilities
No recent KEV-listed items for this vendor/product.
How to fix CVE-2022-50500
Description: In the Linux kernel, the following vulnerability has been resolved: netdevsim: fix memory leak in nsim_drv_probe() when nsim_dev_resources_register() failed If some items in nsim_dev_resources_register() fail, memory leak will occur. The following is the memory leak information. unreferenced object 0xffff888074c02600 (size 128): comm “echo”, pid 8159, jiffies 4294945184 (age 493.530s) hex dump (first 32 bytes): 40 […]
Exploit Difficulty: HARD
⏱️ Time to exploit: > 4 hours
🛠️ Required skills: Advanced security expertise
💰 Public exploits: Rare or not public
How to Fix:
- Check if you're running the affected product
- Update to the latest patched version
- If patching is not immediately possible: restrict network exposure, apply least-privilege access
- Test the fix in a staging environment first
- Review logs for signs of exploitation
- Monitor for IOCs (Indicators of Compromise)
- Enable automatic security updates
- Set up vulnerability monitoring
- Review and harden security configurations
Exploit Difficulty Assessment
Vulnerability Timeline
CVE details first published to NVD database
Added to this CVE tracking system
Detection Rules & IOCs
No specific detection rules generated for this vulnerability type.
No vendor/product data available.