-
CVE-2022-50106
- EPSS 0.04%
- Veröffentlicht 18.06.2025 11:02:40
- Zuletzt bearbeitet 18.06.2025 13:47:40
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- Teams Watchlist Login
- Unerledigt Login
In the Linux kernel, the following vulnerability has been resolved: powerpc/cell/axon_msi: Fix refcount leak in setup_msi_msg_address of_get_next_parent() returns a node pointer with refcount incremented, we should use of_node_put() on it when not need anymore. Add missing of_node_put() in the error path to avoid refcount leak.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
6263ec8032c411b8ef6b7f00198cb18c855ee6cb
Version
ce21b3c9648ae55181787bf25ee00cf91dfd5c91
Status
affected
Version <
51cf876b11fb6ca06f69e9d1de58f892d1522e9d
Version
ce21b3c9648ae55181787bf25ee00cf91dfd5c91
Status
affected
Version <
f388643657cd5a04dc47a68d85321876c5b4c208
Version
ce21b3c9648ae55181787bf25ee00cf91dfd5c91
Status
affected
Version <
00dc7cbbb558955ff410fd392cc9b0366eb06df0
Version
ce21b3c9648ae55181787bf25ee00cf91dfd5c91
Status
affected
Version <
5eaa93caa63abf382b319dbe2f032232026740c2
Version
ce21b3c9648ae55181787bf25ee00cf91dfd5c91
Status
affected
Version <
02ed44125d7a7238999750ca126b60f8dd7a88b1
Version
ce21b3c9648ae55181787bf25ee00cf91dfd5c91
Status
affected
Version <
af41cff4ada533b1cf40de6c468ba164fd32c22d
Version
ce21b3c9648ae55181787bf25ee00cf91dfd5c91
Status
affected
Version <
df5d4b616ee76abc97e5bd348e22659c2b095b1c
Version
ce21b3c9648ae55181787bf25ee00cf91dfd5c91
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
2.6.23
Status
affected
Version <
2.6.23
Version
0
Status
unaffected
Version <=
4.14.*
Version
4.14.291
Status
unaffected
Version <=
4.19.*
Version
4.19.256
Status
unaffected
Version <=
5.4.*
Version
5.4.211
Status
unaffected
Version <=
5.10.*
Version
5.10.137
Status
unaffected
Version <=
5.15.*
Version
5.15.61
Status
unaffected
Version <=
5.18.*
Version
5.18.18
Status
unaffected
Version <=
5.19.*
Version
5.19.2
Status
unaffected
Version <=
*
Version
6.0
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.04% | 0.094 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|