VYPR
Unrated severityNVD Advisory· Published Dec 30, 2025· Updated Apr 15, 2026

CVE-2022-50857

CVE-2022-50857

Description

In the Linux kernel, the following vulnerability has been resolved:

rapidio: rio: fix possible name leak in rio_register_mport()

If device_register() returns error, the name allocated by dev_set_name() need be freed. It should use put_device() to give up the reference in the error path, so that the name can be freed in kobject_cleanup(), and list_del() is called to delete the port from rio_mports.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A memory leak in the Linux kernel's RapidIO subsystem occurs when device_register() fails, leaving the device name allocated but not freed.

Vulnerability

In the Linux kernel's RapidIO subsystem, the function rio_register_mport() allocates a name for the device using dev_set_name(). If device_register() subsequently fails, the allocated name is not freed, leading to a memory leak. The kernel's error handling path does not call put_device() to release the reference and allow kobject_cleanup() to free the name, nor does it remove the port from the rio_mports list [1][2][3].

Exploitation

This vulnerability is triggered during the registration of a new mport device when device_register() returns an error. An attacker with the ability to cause such a registration failure (e.g., by exhausting memory or providing invalid parameters) could repeatedly trigger this leak. No special privileges are required beyond the ability to trigger RapidIO device registration are required, but the attack surface is limited to systems using the RapidIO subsystem.

Impact

An attacker exploiting this vulnerability can cause a memory leak, gradually depleting system memory and potentially leading to a denial-of-service (DoS) condition. The leak is small per occurrence but can be repeated to exhaust memory resources.

Mitigation

The fix has been applied to the Linux kernel stable branches as commits [1], [2], and [3]. Users should update to a kernel version containing these patches. No workaround is available other than applying the patch.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

9

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

9

News mentions

0

No linked articles in our index yet.