-
CVE-2022-50106
- EPSS 0.04%
- Published 18.06.2025 11:02:40
- Last modified 18.06.2025 13:47:40
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- Teams watchlist Login
- Open Login
In the Linux kernel, the following vulnerability has been resolved: powerpc/cell/axon_msi: Fix refcount leak in setup_msi_msg_address of_get_next_parent() returns a node pointer with refcount incremented, we should use of_node_put() on it when not need anymore. Add missing of_node_put() in the error path to avoid refcount leak.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
≫
Product
Linux
Default Statusunaffected
Version <
6263ec8032c411b8ef6b7f00198cb18c855ee6cb
Version
ce21b3c9648ae55181787bf25ee00cf91dfd5c91
Status
affected
Version <
51cf876b11fb6ca06f69e9d1de58f892d1522e9d
Version
ce21b3c9648ae55181787bf25ee00cf91dfd5c91
Status
affected
Version <
f388643657cd5a04dc47a68d85321876c5b4c208
Version
ce21b3c9648ae55181787bf25ee00cf91dfd5c91
Status
affected
Version <
00dc7cbbb558955ff410fd392cc9b0366eb06df0
Version
ce21b3c9648ae55181787bf25ee00cf91dfd5c91
Status
affected
Version <
5eaa93caa63abf382b319dbe2f032232026740c2
Version
ce21b3c9648ae55181787bf25ee00cf91dfd5c91
Status
affected
Version <
02ed44125d7a7238999750ca126b60f8dd7a88b1
Version
ce21b3c9648ae55181787bf25ee00cf91dfd5c91
Status
affected
Version <
af41cff4ada533b1cf40de6c468ba164fd32c22d
Version
ce21b3c9648ae55181787bf25ee00cf91dfd5c91
Status
affected
Version <
df5d4b616ee76abc97e5bd348e22659c2b095b1c
Version
ce21b3c9648ae55181787bf25ee00cf91dfd5c91
Status
affected
VendorLinux
≫
Product
Linux
Default Statusaffected
Version
2.6.23
Status
affected
Version <
2.6.23
Version
0
Status
unaffected
Version <=
4.14.*
Version
4.14.291
Status
unaffected
Version <=
4.19.*
Version
4.19.256
Status
unaffected
Version <=
5.4.*
Version
5.4.211
Status
unaffected
Version <=
5.10.*
Version
5.10.137
Status
unaffected
Version <=
5.15.*
Version
5.15.61
Status
unaffected
Version <=
5.18.*
Version
5.18.18
Status
unaffected
Version <=
5.19.*
Version
5.19.2
Status
unaffected
Version <=
*
Version
6.0
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.04% | 0.094 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|