{"id":"CVE-2022-50672","summary":"mailbox: zynq-ipi: fix error handling while device_register() fails","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nmailbox: zynq-ipi: fix error handling while device_register() fails\n\nIf device_register() fails, it has two issues:\n1. The name allocated by dev_set_name() is leaked.\n2. The parent of device is not NULL, device_unregister() is called\n   in zynqmp_ipi_free_mboxes(), it will lead a kernel crash because\n   of removing not added device.\n\nCall put_device() to give up the reference, so the name is freed in\nkobject_cleanup(). Add device registered check in zynqmp_ipi_free_mboxes()\nto avoid null-ptr-deref.","modified":"2026-03-20T11:00:40.131884Z","published":"2025-12-09T01:29:24.072Z","related":["SUSE-SU-2026:0263-1","SUSE-SU-2026:0317-1","SUSE-SU-2026:0411-1","SUSE-SU-2026:0617-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50672.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/3fcf079958c00d83c51e4f250abf2c77fe9cc1b9"},{"type":"WEB","url":"https://git.kernel.org/stable/c/4f05d8e2fb3ab702c2633a74571e1b31cb579985"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a39b4de0804f9fe0ae911b359ffd4afe7d9d933b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a6792a0cdef0b1c2d77920246283a72537e60e94"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b3a5c76f61e2b380e29dfc6705854ca1ee85501d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f2d63cefc012cafe1b7651bbf3302f8bcd8bea4a"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50672.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50672"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"4981b82ba2ff87df6a711fcd7a233c615df5fc79"},{"fixed":"b3a5c76f61e2b380e29dfc6705854ca1ee85501d"},{"fixed":"a39b4de0804f9fe0ae911b359ffd4afe7d9d933b"},{"fixed":"4f05d8e2fb3ab702c2633a74571e1b31cb579985"},{"fixed":"f2d63cefc012cafe1b7651bbf3302f8bcd8bea4a"},{"fixed":"3fcf079958c00d83c51e4f250abf2c77fe9cc1b9"},{"fixed":"a6792a0cdef0b1c2d77920246283a72537e60e94"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50672.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"5.1.0"},{"fixed":"5.4.229"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.5.0"},{"fixed":"5.10.163"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.86"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.0.16"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.1.0"},{"fixed":"6.1.2"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50672.json"}}],"schema_version":"1.7.5"}