-
CVE-2022-50061
- EPSS 0.04%
- Veröffentlicht 18.06.2025 11:02:09
- Zuletzt bearbeitet 18.06.2025 13:47:40
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- Teams Watchlist Login
- Unerledigt Login
In the Linux kernel, the following vulnerability has been resolved: pinctrl: nomadik: Fix refcount leak in nmk_pinctrl_dt_subnode_to_map of_parse_phandle() returns a node pointer with refcount incremented, we should use of_node_put() on it when not need anymore. Add missing of_node_put() to avoid refcount leak."
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
81abaab5a4b815c0ed9f4d2c9745777ac5cc395b
Version
c2f6d059abfc29822af732e4da70813a5b6fd9cd
Status
affected
Version <
c35f89a9021fa947ecede0584ae509368a52ec5a
Version
c2f6d059abfc29822af732e4da70813a5b6fd9cd
Status
affected
Version <
f498542bc703bf1e5c6a1610e1ea493a437f0196
Version
c2f6d059abfc29822af732e4da70813a5b6fd9cd
Status
affected
Version <
c26012a1e61c7bbd1b393d3bbae8dffdb6df65bb
Version
c2f6d059abfc29822af732e4da70813a5b6fd9cd
Status
affected
Version <
78d05103891d3e96144b846fbc39f2cfb3384eae
Version
c2f6d059abfc29822af732e4da70813a5b6fd9cd
Status
affected
Version <
9272265f2f76629e1a67e6d49b3a4461b3da1a73
Version
c2f6d059abfc29822af732e4da70813a5b6fd9cd
Status
affected
Version <
587ac8ac00a1a9f4572785229d9441870fd7b187
Version
c2f6d059abfc29822af732e4da70813a5b6fd9cd
Status
affected
Version <
4b32e054335ea0ce50967f63a7bfd4db058b14b9
Version
c2f6d059abfc29822af732e4da70813a5b6fd9cd
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
3.18
Status
affected
Version <
3.18
Version
0
Status
unaffected
Version <=
4.9.*
Version
4.9.326
Status
unaffected
Version <=
4.14.*
Version
4.14.291
Status
unaffected
Version <=
4.19.*
Version
4.19.256
Status
unaffected
Version <=
5.4.*
Version
5.4.211
Status
unaffected
Version <=
5.10.*
Version
5.10.138
Status
unaffected
Version <=
5.15.*
Version
5.15.63
Status
unaffected
Version <=
5.19.*
Version
5.19.4
Status
unaffected
Version <=
*
Version
6.0
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.04% | 0.094 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|