CVE-2022-50343
16.09.2025, 17:15
In the Linux kernel, the following vulnerability has been resolved: rapidio: fix possible name leaks when rio_add_device() fails Patch series "rapidio: fix three possible memory leaks". This patchset fixes three name leaks in error handling. - patch #1 fixes two name leaks while rio_add_device() fails. - patch #2 fixes a name leak while rio_register_mport() fails. This patch (of 2): If rio_add_device() returns error, the name allocated by dev_set_name() need be freed. It should use put_device() to give up the reference in the error path, so that the name can be freed in kobject_cleanup(), and the 'rdev' can be freed in rio_release_dev().Enginsight
| Vendor | Product | Version |
|---|---|---|
| linux | linux_kernel | 2.6.30 ≤ 𝑥 < 4.9.337 |
| linux | linux_kernel | 4.10 ≤ 𝑥 < 4.14.303 |
| linux | linux_kernel | 4.15 ≤ 𝑥 < 4.19.270 |
| linux | linux_kernel | 4.20 ≤ 𝑥 < 5.4.229 |
| linux | linux_kernel | 5.5 ≤ 𝑥 < 5.10.163 |
| linux | linux_kernel | 5.11 ≤ 𝑥 < 5.15.86 |
| linux | linux_kernel | 5.16 ≤ 𝑥 < 6.0.16 |
| linux | linux_kernel | 6.1 ≤ 𝑥 < 6.1.2 |
𝑥
= Vulnerable software versions
Debian Releases
Common Weakness Enumeration
Vulnerability Media Exposure
References