Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-50282— chardev: fix error handling in cdev_device_add()

EPSS 0.02% · P4

Affected Version Matrix 22

VendorProductVersion RangeStatus
LinuxLinuxda97a80a657d1b1b50ef633e8ff5dbf0d417fc8d< 5d2146889fad4cb9e6c13e790d4cfd871486eca8affected
233ed09d7fdacf592ee91e6c97ce5f4364fbe7c0< 6acf8597c5b04f455ee0649e11e5f3bcd28f381eaffected
233ed09d7fdacf592ee91e6c97ce5f4364fbe7c0< 34d17b39bceef25e4cf9805cd59250ae05d0a139affected
233ed09d7fdacf592ee91e6c97ce5f4364fbe7c0< d85b5247a79355b8432bfd9ac871f96117f750d4affected
233ed09d7fdacf592ee91e6c97ce5f4364fbe7c0< c46db6088bccff5115674d583fef46ede80077a2affected
233ed09d7fdacf592ee91e6c97ce5f4364fbe7c0< 28dc61cc49c6e995121c6d86bef4b73df78dda80affected
233ed09d7fdacf592ee91e6c97ce5f4364fbe7c0< b5de1eac71fec1af7723f1083d23a24789fd795caffected
233ed09d7fdacf592ee91e6c97ce5f4364fbe7c0< 85a5660491b507d33662b8e81c142e6041e642ebaffected
… +14 more rows
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2022-50282

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
chardev: fix error handling in cdev_device_add()
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: chardev: fix error handling in cdev_device_add() While doing fault injection test, I got the following report: ------------[ cut here ]------------ kobject: '(null)' (0000000039956980): is not initialized, yet kobject_put() is being called. WARNING: CPU: 3 PID: 6306 at kobject_put+0x23d/0x4e0 CPU: 3 PID: 6306 Comm: 283 Tainted: G W 6.1.0-rc2-00005-g307c1086d7c9 #1253 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.13.0-1ubuntu1.1 04/01/2014 RIP: 0010:kobject_put+0x23d/0x4e0 Call Trace: <TASK> cdev_device_add+0x15e/0x1b0 __iio_device_register+0x13b4/0x1af0 [industrialio] __devm_iio_device_register+0x22/0x90 [industrialio] max517_probe+0x3d8/0x6b4 [max517] i2c_device_probe+0xa81/0xc00 When device_add() is injected fault and returns error, if dev->devt is not set, cdev_add() is not called, cdev_del() is not needed. Fix this by checking dev->devt in error path.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于cdev_device_add函数中错误处理不当,可能导致空指针取消引用。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux da97a80a657d1b1b50ef633e8ff5dbf0d417fc8d ~ 5d2146889fad4cb9e6c13e790d4cfd871486eca8 -
LinuxLinux 4.12 -

II. Public POCs for CVE-2022-50282

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2022-50282

登录查看更多情报信息。

Same Patch Batch · Linux · 2025-09-15 · 210 CVEs total

CVE-2022-50293btrfs: do not BUG_ON() on ENOMEM when dropping extent items for a range
CVE-2023-53232mt76: mt7921: fix kernel panic by accessing unallocated eeprom.data
CVE-2023-53233net/smc: fix deadlock triggered by cancel_delayed_work_syn()
CVE-2023-53234watchdog: Fix kmemleak in watchdog_cdev_register
CVE-2023-53235drm/tests: helpers: Avoid a driver uaf
CVE-2023-53236iommufd: Do not corrupt the pfn list when doing batch carry
CVE-2023-53237drm/amdgpu: fix amdgpu_irq_put call trace in gmc_v11_0_hw_fini
CVE-2023-53238phy: hisilicon: Fix an out of bounds check in hisi_inno_phy_probe()
CVE-2023-53239drm/msm/mdp5: Add check for kzalloc
CVE-2023-53240xsk: check IFF_UP earlier in Tx path
CVE-2023-53241nfsd: call op_release, even when op_func returns an error
CVE-2023-53242thermal/drivers/hisi: Drop second sensor hi3660
CVE-2022-50291kcm: annotate data-races around kcm->rx_psock
CVE-2022-50292drm/msm/dp: fix bridge lifetime
CVE-2022-50303drm/amdkfd: Fix double release compute pasid
CVE-2022-50300btrfs: fix extent map use-after-free when handling missing device in read_one_chunk
CVE-2022-50301iommu/omap: Fix buffer overflow in debugfs
CVE-2022-50302lockd: set other missing fields when unlocking files
CVE-2022-50299md: Replace snprintf with scnprintf
CVE-2022-50304mtd: core: fix possible resource leak in init_mtd()

Showing top 20 of 210 CVEs. View all on vendor page &rarr; →

IV. Related Vulnerabilities

V. Comments for CVE-2022-50282

No comments yet


Leave a comment