In the Linux kernel, the following vulnerability has been...
Unreviewed
Published
Sep 16, 2025
to the GitHub Advisory Database
•
Updated Sep 16, 2025
Description
Published by the National Vulnerability Database
Sep 16, 2025
Published to the GitHub Advisory Database
Sep 16, 2025
Last updated
Sep 16, 2025
In the Linux kernel, the following vulnerability has been resolved:
rapidio: fix possible name leaks when rio_add_device() fails
Patch series "rapidio: fix three possible memory leaks".
This patchset fixes three name leaks in error handling.
This patch (of 2):
If rio_add_device() returns error, the name allocated by dev_set_name()
need be freed. It should use put_device() to give up the reference in the
error path, so that the name can be freed in kobject_cleanup(), and the
'rdev' can be freed in rio_release_dev().
References