0.0
NA
CVE-2022-50810
rapidio: devices: fix missing put_device in mport_cdev_open
Description

In the Linux kernel, the following vulnerability has been resolved: rapidio: devices: fix missing put_device in mport_cdev_open When kfifo_alloc fails, the refcount of chdev->dev is left incremental. We should use put_device(&chdev->dev) to decrease the ref count of chdev->dev to avoid refcount leak.

INFO

Published Date :

Dec. 30, 2025, 1:15 p.m.

Last Modified :

Dec. 30, 2025, 1:15 p.m.

Remotely Exploit :

No

Source :

416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Products

The following products are affected by CVE-2022-50810 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

No affected product recoded yet

Solution
Fix a refcount leak by ensuring device reference is decremented when allocation fails.
  • Ensure put_device is called when kfifo_alloc fails.
  • Decrement chdev->dev refcount on allocation failure.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2022-50810 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2022-50810 weaknesses.

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2022-50810 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2022-50810 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • New CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67

    Dec. 30, 2025

    Action Type Old Value New Value
    Added Description In the Linux kernel, the following vulnerability has been resolved: rapidio: devices: fix missing put_device in mport_cdev_open When kfifo_alloc fails, the refcount of chdev->dev is left incremental. We should use put_device(&chdev->dev) to decrease the ref count of chdev->dev to avoid refcount leak.
    Added Reference https://git.kernel.org/stable/c/162433a96079bfa5ec748c486b4570f138d04fb5
    Added Reference https://git.kernel.org/stable/c/53915ecc43c5139d6cdd1caa4fdc9290b9597008
    Added Reference https://git.kernel.org/stable/c/6e4540e0970030e140998ce8847f5f0171b5afa1
    Added Reference https://git.kernel.org/stable/c/a0d93aac54ce07a7cc71e90645d0cdabbda50450
    Added Reference https://git.kernel.org/stable/c/ae57222402bea455e60cc51d2f52ce73b63b7af8
    Added Reference https://git.kernel.org/stable/c/b596242585984b5f3085aa8f7a82c65640b384b6
    Added Reference https://git.kernel.org/stable/c/bb7397f6312d2cbf05e415676ed5b1655cb82a34
    Added Reference https://git.kernel.org/stable/c/d5b6e6eba3af11cb2a2791fa36a2524990fcde1a
    Added Reference https://git.kernel.org/stable/c/dfee9fe93dd34cd9d49520718f6ec2072de25e48
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
Vulnerability Scoring Details
No CVSS metrics available for this vulnerability.