{"id":"CVE-2022-50343","summary":"rapidio: fix possible name leaks when rio_add_device() fails","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nrapidio: fix possible name leaks when rio_add_device() fails\n\nPatch series \"rapidio: fix three possible memory leaks\".\n\nThis patchset fixes three name leaks in error handling.\n - patch #1 fixes two name leaks while rio_add_device() fails.\n - patch #2 fixes a name leak while  rio_register_mport() fails.\n\n\nThis patch (of 2):\n\nIf rio_add_device() returns error, the name allocated by dev_set_name()\nneed be freed.  It should use put_device() to give up the reference in the\nerror path, so that the name can be freed in kobject_cleanup(), and the\n'rdev' can be freed in rio_release_dev().","modified":"2026-04-02T08:28:25.868250Z","published":"2025-09-16T16:11:22.514Z","database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50343.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/3b4676f274a6b5d001176f15d0542100bbf4b59a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/440afd7fd9b164fdde6fc9da8c47d3d7f20dcce8"},{"type":"WEB","url":"https://git.kernel.org/stable/c/80fad2e53eaed2b3a2ff596575f65669e13ceda5"},{"type":"WEB","url":"https://git.kernel.org/stable/c/85fbf58b15c09d3a6a03098c1e42ebfe9002f39d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/88fa351b20ca300693a206ccd3c4b0e0647944d8"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c413f65011ff8caffabcde0e1c3ceede48a48d6f"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c482cb0deb57924335103fe592c379a076d867f8"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ec3f04f74f50d0b6bac04d795c93c2b852753a7a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f9574cd48679926e2a569e1957a5a1bcc8a719ac"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50343.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50343"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"1fa5ae857bb14f6046205171d98506d8112dd74e"},{"fixed":"3b4676f274a6b5d001176f15d0542100bbf4b59a"},{"fixed":"c482cb0deb57924335103fe592c379a076d867f8"},{"fixed":"80fad2e53eaed2b3a2ff596575f65669e13ceda5"},{"fixed":"440afd7fd9b164fdde6fc9da8c47d3d7f20dcce8"},{"fixed":"88fa351b20ca300693a206ccd3c4b0e0647944d8"},{"fixed":"ec3f04f74f50d0b6bac04d795c93c2b852753a7a"},{"fixed":"c413f65011ff8caffabcde0e1c3ceede48a48d6f"},{"fixed":"85fbf58b15c09d3a6a03098c1e42ebfe9002f39d"},{"fixed":"f9574cd48679926e2a569e1957a5a1bcc8a719ac"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50343.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}