CVE-2022-50857Linux vulnerability

7 documents6 sources
Severity
5.3MEDIUM
No vector
EPSS
0.0%
top 84.94%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 30

Description

In the Linux kernel, the following vulnerability has been resolved: rapidio: rio: fix possible name leak in rio_register_mport() If device_register() returns error, the name allocated by dev_set_name() need be freed. It should use put_device() to give up the reference in the error path, so that the name can be freed in kobject_cleanup(), and list_del() is called to delete the port from rio_mports.

Affected Packages4 packages

Linuxlinux/linux_kernel3.15.04.9.337+7
Debianlinux/linux_kernel< 5.10.178-1+3
CVEListV5linux/linux2aaf308b95b24649a6dcfed89cd956e972089b2a0a71344f99289250e4d5b8adbac76f444485c840+9
debiandebian/linux< linux 6.1.4-1 (bookworm)

🔴Vulnerability Details

3
GHSA
GHSA-mmh4-m2wj-3q4g: In the Linux kernel, the following vulnerability has been resolved: rapidio: rio: fix possible name leak in rio_register_mport() If device_register(2025-12-30
OSV
CVE-2022-50857: In the Linux kernel, the following vulnerability has been resolved: rapidio: rio: fix possible name leak in rio_register_mport() If device_register()2025-12-30
OSV
rapidio: rio: fix possible name leak in rio_register_mport()2025-12-30

📋Vendor Advisories

2
Red Hat
kernel: rapidio: rio: fix possible name leak in rio_register_mport()2025-12-30
Debian
CVE-2022-50857: linux - In the Linux kernel, the following vulnerability has been resolved: rapidio: ri...2022

🕵️Threat Intelligence

1
Wiz
CVE-2022-50857 Impact, Exploitability, and Mitigation Steps | Wiz