CVE-2022-50810
Description
In the Linux kernel, the following vulnerability has been resolved:
rapidio: devices: fix missing put_device in mport_cdev_open
When kfifo_alloc fails, the refcount of chdev->dev is left incremental. We should use put_device(&chdev->dev) to decrease the ref count of chdev->dev to avoid refcount leak.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A missing put_device in the Linux kernel's RapidIO mport_cdev_open causes a refcount leak when kfifo_alloc fails.
Vulnerability
Description
In the Linux kernel, the RapidIO subsystem's mport_cdev_open function fails to call put_device on chdev->dev when kfifo_alloc fails. This oversight leaves the device's reference count incremented, leading to a reference leak [1][2][3][4].
Exploitation
Prerequisites
An attacker would need to trigger a failure of kfifo_alloc within the mport_cdev_open path. This may require specific system conditions or resource exhaustion to cause the allocation to fail. The vulnerability is local and requires access to the RapidIO character device interface.
Impact
If successfully exploited, the reference count leak prevents the device from being properly released, potentially leading to memory corruption or a use-after-free condition when the device is eventually freed. This could allow a local attacker to cause a denial of service or escalate privileges.
Mitigation
The fix involves adding put_device(&chdev->dev) after a failed kfifo_alloc call to properly decrement the reference count. Patches have been applied to the Linux kernel stable branches as referenced [1][2][3][4]. Users should update to the latest kernel version containing the fix.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
96e4540e09700ae57222402bedfee9fe93dd3bb7397f6312d53915ecc43c5a0d93aac54ce162433a96079b59624258598d5b6e6eba3afVulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
9- git.kernel.org/stable/c/162433a96079bfa5ec748c486b4570f138d04fb5nvd
- git.kernel.org/stable/c/53915ecc43c5139d6cdd1caa4fdc9290b9597008nvd
- git.kernel.org/stable/c/6e4540e0970030e140998ce8847f5f0171b5afa1nvd
- git.kernel.org/stable/c/a0d93aac54ce07a7cc71e90645d0cdabbda50450nvd
- git.kernel.org/stable/c/ae57222402bea455e60cc51d2f52ce73b63b7af8nvd
- git.kernel.org/stable/c/b596242585984b5f3085aa8f7a82c65640b384b6nvd
- git.kernel.org/stable/c/bb7397f6312d2cbf05e415676ed5b1655cb82a34nvd
- git.kernel.org/stable/c/d5b6e6eba3af11cb2a2791fa36a2524990fcde1anvd
- git.kernel.org/stable/c/dfee9fe93dd34cd9d49520718f6ec2072de25e48nvd
News mentions
0No linked articles in our index yet.