-
CVE-2022-50061
- EPSS 0.04%
- Published 18.06.2025 11:02:09
- Last modified 18.06.2025 13:47:40
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- Teams watchlist Login
- Open Login
In the Linux kernel, the following vulnerability has been resolved: pinctrl: nomadik: Fix refcount leak in nmk_pinctrl_dt_subnode_to_map of_parse_phandle() returns a node pointer with refcount incremented, we should use of_node_put() on it when not need anymore. Add missing of_node_put() to avoid refcount leak."
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
≫
Product
Linux
Default Statusunaffected
Version <
81abaab5a4b815c0ed9f4d2c9745777ac5cc395b
Version
c2f6d059abfc29822af732e4da70813a5b6fd9cd
Status
affected
Version <
c35f89a9021fa947ecede0584ae509368a52ec5a
Version
c2f6d059abfc29822af732e4da70813a5b6fd9cd
Status
affected
Version <
f498542bc703bf1e5c6a1610e1ea493a437f0196
Version
c2f6d059abfc29822af732e4da70813a5b6fd9cd
Status
affected
Version <
c26012a1e61c7bbd1b393d3bbae8dffdb6df65bb
Version
c2f6d059abfc29822af732e4da70813a5b6fd9cd
Status
affected
Version <
78d05103891d3e96144b846fbc39f2cfb3384eae
Version
c2f6d059abfc29822af732e4da70813a5b6fd9cd
Status
affected
Version <
9272265f2f76629e1a67e6d49b3a4461b3da1a73
Version
c2f6d059abfc29822af732e4da70813a5b6fd9cd
Status
affected
Version <
587ac8ac00a1a9f4572785229d9441870fd7b187
Version
c2f6d059abfc29822af732e4da70813a5b6fd9cd
Status
affected
Version <
4b32e054335ea0ce50967f63a7bfd4db058b14b9
Version
c2f6d059abfc29822af732e4da70813a5b6fd9cd
Status
affected
VendorLinux
≫
Product
Linux
Default Statusaffected
Version
3.18
Status
affected
Version <
3.18
Version
0
Status
unaffected
Version <=
4.9.*
Version
4.9.326
Status
unaffected
Version <=
4.14.*
Version
4.14.291
Status
unaffected
Version <=
4.19.*
Version
4.19.256
Status
unaffected
Version <=
5.4.*
Version
5.4.211
Status
unaffected
Version <=
5.10.*
Version
5.10.138
Status
unaffected
Version <=
5.15.*
Version
5.15.63
Status
unaffected
Version <=
5.19.*
Version
5.19.4
Status
unaffected
Version <=
*
Version
6.0
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.04% | 0.094 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|