{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2022-50481","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2025-10-04T15:13:33.468Z","datePublished":"2025-10-04T15:16:40.374Z","dateUpdated":"2026-05-11T19:20:19.702Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T19:20:19.702Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\ncxl: fix possible null-ptr-deref in cxl_guest_init_afu|adapter()\n\nIf device_register() fails in cxl_register_afu|adapter(), the device\nis not added, device_unregister() can not be called in the error path,\notherwise it will cause a null-ptr-deref because of removing not added\ndevice.\n\nAs comment of device_register() says, it should use put_device() to give\nup the reference in the error path. So split device_unregister() into\ndevice_del() and put_device(), then goes to put dev when register fails."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/misc/cxl/guest.c"],"versions":[{"version":"14baf4d9c739e6e69150512d2eb23c71fffcc192","lessThan":"96fba6fb95bdede80583c262ac185da09661f264","status":"affected","versionType":"git"},{"version":"14baf4d9c739e6e69150512d2eb23c71fffcc192","lessThan":"1ae581696b7a799afa39a664c4b721569643f58a","status":"affected","versionType":"git"},{"version":"14baf4d9c739e6e69150512d2eb23c71fffcc192","lessThan":"d775a1da5a52b4f4bb02f2707ba420d1bec48dbb","status":"affected","versionType":"git"},{"version":"14baf4d9c739e6e69150512d2eb23c71fffcc192","lessThan":"60b2ed21a65f3f5318666ccd765c3507991370cf","status":"affected","versionType":"git"},{"version":"14baf4d9c739e6e69150512d2eb23c71fffcc192","lessThan":"170e8c2d2b61e15e7f7cfeded81bc1e959a15ed8","status":"affected","versionType":"git"},{"version":"14baf4d9c739e6e69150512d2eb23c71fffcc192","lessThan":"e5021bbf11b024cc65ea1e84c377df484183be4b","status":"affected","versionType":"git"},{"version":"14baf4d9c739e6e69150512d2eb23c71fffcc192","lessThan":"b32559ee4e6667c5c3daf4ec5454c277d1f255d2","status":"affected","versionType":"git"},{"version":"14baf4d9c739e6e69150512d2eb23c71fffcc192","lessThan":"ab44c182353be101c3be9465e1d15d42130c53c4","status":"affected","versionType":"git"},{"version":"14baf4d9c739e6e69150512d2eb23c71fffcc192","lessThan":"61c80d1c3833e196256fb060382db94f24d3d9a7","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/misc/cxl/guest.c"],"versions":[{"version":"4.6","status":"affected"},{"version":"0","lessThan":"4.6","status":"unaffected","versionType":"semver"},{"version":"4.9.337","lessThanOrEqual":"4.9.*","status":"unaffected","versionType":"semver"},{"version":"4.14.303","lessThanOrEqual":"4.14.*","status":"unaffected","versionType":"semver"},{"version":"4.19.270","lessThanOrEqual":"4.19.*","status":"unaffected","versionType":"semver"},{"version":"5.4.229","lessThanOrEqual":"5.4.*","status":"unaffected","versionType":"semver"},{"version":"5.10.163","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.86","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.0.16","lessThanOrEqual":"6.0.*","status":"unaffected","versionType":"semver"},{"version":"6.1.2","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.2","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.6","versionEndExcluding":"4.9.337"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.6","versionEndExcluding":"4.14.303"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.6","versionEndExcluding":"4.19.270"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.6","versionEndExcluding":"5.4.229"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.6","versionEndExcluding":"5.10.163"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.6","versionEndExcluding":"5.15.86"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.6","versionEndExcluding":"6.0.16"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.6","versionEndExcluding":"6.1.2"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.6","versionEndExcluding":"6.2"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/96fba6fb95bdede80583c262ac185da09661f264"},{"url":"https://git.kernel.org/stable/c/1ae581696b7a799afa39a664c4b721569643f58a"},{"url":"https://git.kernel.org/stable/c/d775a1da5a52b4f4bb02f2707ba420d1bec48dbb"},{"url":"https://git.kernel.org/stable/c/60b2ed21a65f3f5318666ccd765c3507991370cf"},{"url":"https://git.kernel.org/stable/c/170e8c2d2b61e15e7f7cfeded81bc1e959a15ed8"},{"url":"https://git.kernel.org/stable/c/e5021bbf11b024cc65ea1e84c377df484183be4b"},{"url":"https://git.kernel.org/stable/c/b32559ee4e6667c5c3daf4ec5454c277d1f255d2"},{"url":"https://git.kernel.org/stable/c/ab44c182353be101c3be9465e1d15d42130c53c4"},{"url":"https://git.kernel.org/stable/c/61c80d1c3833e196256fb060382db94f24d3d9a7"}],"title":"cxl: fix possible null-ptr-deref in cxl_guest_init_afu|adapter()","x_generator":{"engine":"bippy-1.2.0"}}}}