Home

Description

In the Linux kernel, the following vulnerability has been resolved: misc: ocxl: fix possible name leak in ocxl_file_register_afu() If device_register() returns error in ocxl_file_register_afu(), the name allocated by dev_set_name() need be freed. As comment of device_register() says, it should use put_device() to give up the reference in the error path. So fix this by calling put_device(), then the name can be freed in kobject_cleanup(), and info is freed in info_release().

PUBLISHED Reserved 2025-12-09 | Published 2025-12-09 | Updated 2025-12-09 | Assigner Linux

Product status

Default status
unaffected

75ca758adbafc81804c39b2c200ecdc819a6c042 (git) before 0cd05062371a49774e8a45258bdedf0bd6d3d327
affected

75ca758adbafc81804c39b2c200ecdc819a6c042 (git) before 7525741cb302a1672b8c3a5edb2a08e4229b5c7c
affected

75ca758adbafc81804c39b2c200ecdc819a6c042 (git) before 3299983a6bf628249ac650908e62d12de959341e
affected

75ca758adbafc81804c39b2c200ecdc819a6c042 (git) before 557b7de055d1e230ddb6664c29d26917b8db9143
affected

75ca758adbafc81804c39b2c200ecdc819a6c042 (git) before 2fce8b3583d1641a1716486f408478b58e96ec91
affected

75ca758adbafc81804c39b2c200ecdc819a6c042 (git) before a4cb1004aeed2ab893a058fad00a5b41a12c4691
affected

Default status
affected

5.2
affected

Any version before 5.2
unaffected

5.4.229 (semver)
unaffected

5.10.163 (semver)
unaffected

5.15.86 (semver)
unaffected

6.0.16 (semver)
unaffected

6.1.2 (semver)
unaffected

6.2 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/0cd05062371a49774e8a45258bdedf0bd6d3d327

git.kernel.org/...c/7525741cb302a1672b8c3a5edb2a08e4229b5c7c

git.kernel.org/...c/3299983a6bf628249ac650908e62d12de959341e

git.kernel.org/...c/557b7de055d1e230ddb6664c29d26917b8db9143

git.kernel.org/...c/2fce8b3583d1641a1716486f408478b58e96ec91

git.kernel.org/...c/a4cb1004aeed2ab893a058fad00a5b41a12c4691

cve.org (CVE-2022-50669)

nvd.nist.gov (CVE-2022-50669)

Download JSON