CVE-2022-50343
MEDIUMLinux Kernel < 4.9.337 - Memory Leak
Title source: ruleDescription
In the Linux kernel, the following vulnerability has been resolved: rapidio: fix possible name leaks when rio_add_device() fails Patch series "rapidio: fix three possible memory leaks". This patchset fixes three name leaks in error handling. - patch #1 fixes two name leaks while rio_add_device() fails. - patch #2 fixes a name leak while rio_register_mport() fails. This patch (of 2): If rio_add_device() returns error, the name allocated by dev_set_name() need be freed. It should use put_device() to give up the reference in the error path, so that the name can be freed in kobject_cleanup(), and the 'rdev' can be freed in rio_release_dev().
References (9)
Scores
CVSS v3
5.5
EPSS
0.0001
EPSS Percentile
2.5%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Classification
CWE
CWE-401
Status
published
Affected Products (9)
linux/linux_kernel
< 4.9.337
linux/Kernel
< 4.9.337linux
linux/Kernel
< 4.14.303linux
linux/Kernel
< 4.19.270linux
linux/Kernel
< 5.4.229linux
linux/Kernel
< 5.10.163linux
linux/Kernel
< 5.15.86linux
linux/Kernel
< 6.0.16linux
linux/Kernel
< 6.1.2linux
Timeline
Published
Sep 16, 2025
Tracked Since
Feb 18, 2026