U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2022-50481 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: cxl: fix possible null-ptr-deref in cxl_guest_init_afu|adapter() If device_register() fails in cxl_register_afu|adapter(), the device is not added, device_unregister() can not be called in the error path, otherwise it will cause a null-ptr-deref because of removing not added device. As comment of device_register() says, it should use put_device() to give up the reference in the error path. So split device_unregister() into device_del() and put_device(), then goes to put dev when register fails.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

URL Source(s) Tag(s)
https://git.kernel.org/stable/c/170e8c2d2b61e15e7f7cfeded81bc1e959a15ed8 kernel.org
https://git.kernel.org/stable/c/1ae581696b7a799afa39a664c4b721569643f58a kernel.org
https://git.kernel.org/stable/c/60b2ed21a65f3f5318666ccd765c3507991370cf kernel.org
https://git.kernel.org/stable/c/61c80d1c3833e196256fb060382db94f24d3d9a7 kernel.org
https://git.kernel.org/stable/c/96fba6fb95bdede80583c262ac185da09661f264 kernel.org
https://git.kernel.org/stable/c/ab44c182353be101c3be9465e1d15d42130c53c4 kernel.org
https://git.kernel.org/stable/c/b32559ee4e6667c5c3daf4ec5454c277d1f255d2 kernel.org
https://git.kernel.org/stable/c/d775a1da5a52b4f4bb02f2707ba420d1bec48dbb kernel.org
https://git.kernel.org/stable/c/e5021bbf11b024cc65ea1e84c377df484183be4b kernel.org

Weakness Enumeration

CWE-ID CWE Name Source

Change History

1 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2022-50481
NVD Published Date:
10/04/2025
NVD Last Modified:
10/04/2025
Source:
kernel.org