CVE-2022-50421

Source
https://cve.org/CVERecord?id=CVE-2022-50421
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50421.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-50421
Downstream
Published
2025-10-01T11:41:54.351Z
Modified
2026-03-20T11:47:26.954252Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
rpmsg: char: Avoid double destroy of default endpoint
Details

In the Linux kernel, the following vulnerability has been resolved:

rpmsg: char: Avoid double destroy of default endpoint

The rpmsgdevremove() in rpmsg_core is the place for releasing this default endpoint.

So need to avoid destroying the default endpoint in rpmsgchrdeveptdevdestroy(), this should be the same as rpmsgeptdev_release(). Otherwise there will be double destroy issue that ept->refcount report warning:

refcount_t: underflow; use-after-free.

Call trace: refcountwarnsaturate+0xf8/0x150 virtiorpmsgdestroyept+0xd4/0xec rpmsgdev_remove+0x60/0x70

The issue can be reproduced by stopping remoteproc before closing the /dev/rpmsgX.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50421.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
bea9b79c2d10fecf7bfa26e212ecefe61d232e39
Fixed
ef828a39d6a7028836eaf37df3ad568c8c2dd6f9
Fixed
3f20ef7a845c2c8d7ec82ecffa20d95cab5ecfeb
Fixed
467233a4ac29b215d492843d067a9f091e6bf0c5

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50421.json"