-

CVE-2022-50245

In the Linux kernel, the following vulnerability has been resolved:

rapidio: fix possible UAF when kfifo_alloc() fails

If kfifo_alloc() fails in mport_cdev_open(), goto err_fifo and just free
priv. But priv is still in the chdev->file_list, then list traversal
may cause UAF. This fixes the following smatch warning:

drivers/rapidio/devices/rio_mport_cdev.c:1930 mport_cdev_open() warn: '&priv->list' not removed from list

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < 2a6c75adf8192f07ddcdd4a1a13488c890a73919
Version e8de370188d098bb49483c287b44925957c3c9b6
Status affected
Version < 2dfd60724d271a6ab99f93f40f38f2ced1ddbb87
Version e8de370188d098bb49483c287b44925957c3c9b6
Status affected
Version < a253dde0403a153075ffb254f6f7b2635e49e97a
Version e8de370188d098bb49483c287b44925957c3c9b6
Status affected
Version < 311b488405ac45af46756b1c8f1d27007b68b07e
Version e8de370188d098bb49483c287b44925957c3c9b6
Status affected
Version < 5ee850645e42f541ce1ea8130c2b27cc495f965c
Version e8de370188d098bb49483c287b44925957c3c9b6
Status affected
Version < 2f5cc7fd73fd6253cc71214f0dd499cc62feb469
Version e8de370188d098bb49483c287b44925957c3c9b6
Status affected
Version < 2ba06e57f933f0eac242e8b389433da1cc00d4d5
Version e8de370188d098bb49483c287b44925957c3c9b6
Status affected
Version < cb87af2c19c0993f6e21f75b963a5599c5a73e76
Version e8de370188d098bb49483c287b44925957c3c9b6
Status affected
Version < 02d7d89f816951e0862147d751b1150d67aaebdd
Version e8de370188d098bb49483c287b44925957c3c9b6
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 4.6
Status affected
Version < 4.6
Version 0
Status unaffected
Version <= 4.9.*
Version 4.9.337
Status unaffected
Version <= 4.14.*
Version 4.14.303
Status unaffected
Version <= 4.19.*
Version 4.19.270
Status unaffected
Version <= 5.4.*
Version 5.4.229
Status unaffected
Version <= 5.10.*
Version 5.10.163
Status unaffected
Version <= 5.15.*
Version 5.15.86
Status unaffected
Version <= 6.0.*
Version 6.0.16
Status unaffected
Version <= 6.1.*
Version 6.1.2
Status unaffected
Version <= *
Version 6.2
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.04% 0.126
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string