Home

Description

In the Linux kernel, the following vulnerability has been resolved: rapidio: fix possible name leaks when rio_add_device() fails Patch series "rapidio: fix three possible memory leaks". This patchset fixes three name leaks in error handling. - patch #1 fixes two name leaks while rio_add_device() fails. - patch #2 fixes a name leak while rio_register_mport() fails. This patch (of 2): If rio_add_device() returns error, the name allocated by dev_set_name() need be freed. It should use put_device() to give up the reference in the error path, so that the name can be freed in kobject_cleanup(), and the 'rdev' can be freed in rio_release_dev().

PUBLISHED Reserved 2025-09-16 | Published 2025-09-16 | Updated 2025-09-16 | Assigner Linux

Product status

Default status
unaffected

1fa5ae857bb14f6046205171d98506d8112dd74e (git) before 3b4676f274a6b5d001176f15d0542100bbf4b59a
affected

1fa5ae857bb14f6046205171d98506d8112dd74e (git) before c482cb0deb57924335103fe592c379a076d867f8
affected

1fa5ae857bb14f6046205171d98506d8112dd74e (git) before 80fad2e53eaed2b3a2ff596575f65669e13ceda5
affected

1fa5ae857bb14f6046205171d98506d8112dd74e (git) before 440afd7fd9b164fdde6fc9da8c47d3d7f20dcce8
affected

1fa5ae857bb14f6046205171d98506d8112dd74e (git) before 88fa351b20ca300693a206ccd3c4b0e0647944d8
affected

1fa5ae857bb14f6046205171d98506d8112dd74e (git) before ec3f04f74f50d0b6bac04d795c93c2b852753a7a
affected

1fa5ae857bb14f6046205171d98506d8112dd74e (git) before c413f65011ff8caffabcde0e1c3ceede48a48d6f
affected

1fa5ae857bb14f6046205171d98506d8112dd74e (git) before 85fbf58b15c09d3a6a03098c1e42ebfe9002f39d
affected

1fa5ae857bb14f6046205171d98506d8112dd74e (git) before f9574cd48679926e2a569e1957a5a1bcc8a719ac
affected

Default status
affected

2.6.30
affected

Any version before 2.6.30
unaffected

4.9.337 (semver)
unaffected

4.14.303 (semver)
unaffected

4.19.270 (semver)
unaffected

5.4.229 (semver)
unaffected

5.10.163 (semver)
unaffected

5.15.86 (semver)
unaffected

6.0.16 (semver)
unaffected

6.1.2 (semver)
unaffected

6.2 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/3b4676f274a6b5d001176f15d0542100bbf4b59a

git.kernel.org/...c/c482cb0deb57924335103fe592c379a076d867f8

git.kernel.org/...c/80fad2e53eaed2b3a2ff596575f65669e13ceda5

git.kernel.org/...c/440afd7fd9b164fdde6fc9da8c47d3d7f20dcce8

git.kernel.org/...c/88fa351b20ca300693a206ccd3c4b0e0647944d8

git.kernel.org/...c/ec3f04f74f50d0b6bac04d795c93c2b852753a7a

git.kernel.org/...c/c413f65011ff8caffabcde0e1c3ceede48a48d6f

git.kernel.org/...c/85fbf58b15c09d3a6a03098c1e42ebfe9002f39d

git.kernel.org/...c/f9574cd48679926e2a569e1957a5a1bcc8a719ac

cve.org (CVE-2022-50343)

nvd.nist.gov (CVE-2022-50343)

Download JSON