0.0
NA
CVE-2022-50245
rapidio: fix possible UAF when kfifo_alloc() fails
Description

In the Linux kernel, the following vulnerability has been resolved: rapidio: fix possible UAF when kfifo_alloc() fails If kfifo_alloc() fails in mport_cdev_open(), goto err_fifo and just free priv. But priv is still in the chdev->file_list, then list traversal may cause UAF. This fixes the following smatch warning: drivers/rapidio/devices/rio_mport_cdev.c:1930 mport_cdev_open() warn: '&priv->list' not removed from list

INFO

Published Date :

Sept. 15, 2025, 2:15 p.m.

Last Modified :

Sept. 15, 2025, 3:21 p.m.

Remotely Exploit :

No

Source :

416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Products

The following products are affected by CVE-2022-50245 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

No affected product recoded yet

Solution
Address use-after-free by properly removing private data from the list before freeing.
  • Ensure private data is removed from the list before freeing.
  • Apply the provided kernel patch.
  • Recompile and install the Linux kernel.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2022-50245 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2022-50245 weaknesses.

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2022-50245 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2022-50245 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • New CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67

    Sep. 15, 2025

    Action Type Old Value New Value
    Added Description In the Linux kernel, the following vulnerability has been resolved: rapidio: fix possible UAF when kfifo_alloc() fails If kfifo_alloc() fails in mport_cdev_open(), goto err_fifo and just free priv. But priv is still in the chdev->file_list, then list traversal may cause UAF. This fixes the following smatch warning: drivers/rapidio/devices/rio_mport_cdev.c:1930 mport_cdev_open() warn: '&priv->list' not removed from list
    Added Reference https://git.kernel.org/stable/c/02d7d89f816951e0862147d751b1150d67aaebdd
    Added Reference https://git.kernel.org/stable/c/2a6c75adf8192f07ddcdd4a1a13488c890a73919
    Added Reference https://git.kernel.org/stable/c/2ba06e57f933f0eac242e8b389433da1cc00d4d5
    Added Reference https://git.kernel.org/stable/c/2dfd60724d271a6ab99f93f40f38f2ced1ddbb87
    Added Reference https://git.kernel.org/stable/c/2f5cc7fd73fd6253cc71214f0dd499cc62feb469
    Added Reference https://git.kernel.org/stable/c/311b488405ac45af46756b1c8f1d27007b68b07e
    Added Reference https://git.kernel.org/stable/c/5ee850645e42f541ce1ea8130c2b27cc495f965c
    Added Reference https://git.kernel.org/stable/c/a253dde0403a153075ffb254f6f7b2635e49e97a
    Added Reference https://git.kernel.org/stable/c/cb87af2c19c0993f6e21f75b963a5599c5a73e76
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
Vulnerability Scoring Details
No CVSS metrics available for this vulnerability.