CVE-2022-50088 Affecting python3-perf package, versions <0:5.14.0-284.11.1.el9_2


Severity

Recommended
high

Based on CentOS security rating.

Threat Intelligence

EPSS
0.02% (5th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-CENTOS9-PYTHON3PERF-10519331
  • published26 Jun 2025
  • disclosed18 Jun 2025

Introduced: 18 Jun 2025

NewCVE-2022-50088  (opens in a new tab)

How to fix?

Upgrade Centos:9 python3-perf to version 0:5.14.0-284.11.1.el9_2 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream python3-perf package and not the python3-perf package as distributed by Centos. See How to fix? for Centos:9 relevant fixed versions and status.

In the Linux kernel, the following vulnerability has been resolved:

mm/damon/reclaim: fix potential memory leak in damon_reclaim_init()

damon_reclaim_init() allocates a memory chunk for ctx with damon_new_ctx(). When damon_select_ops() fails, ctx is not released, which will lead to a memory leak.

We should release the ctx with damon_destroy_ctx() when damon_select_ops() fails to fix the memory leak.

CVSS Base Scores

version 3.1