-

CVE-2022-50119

In the Linux kernel, the following vulnerability has been resolved:

rpmsg: Fix possible refcount leak in rpmsg_register_device_override()

rpmsg_register_device_override need to call put_device to free vch when
driver_set_override fails.

Fix this by adding a put_device() to the error path.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < 280ae5a028ef5d14ef9277746a3026a30aaebe4f
Version b585daa34a0a852e6d5e553132b411b6a0192d27
Status affected
Version < c449b28e437d18ae807479c4ac6b69d87b287c79
Version c14c6676ad5b78950a45121a7ee6cfb85778e71f
Status affected
Version < 01e6885b75e25a2dd0726455ef18ef9ce5e7dc87
Version 3d14785980571ebb313a976e589b9d3563adc704
Status affected
Version < 3fdd5b2bb09fc2b5bf3504778f51c89bb48c097f
Version 5f1bb9f4d4b55c39180329c4e379aa740039eed3
Status affected
Version < d4c8bf5635c4bedaf2470761ced1f502b2d5434e
Version bfd4a664ddfbe12f008efb0b0ab6bf25a8ab2538
Status affected
Version < c29335612ff44df979678a38e1f55c62004f421c
Version bb17d110cbf270d5247a6e261c5ad50e362d1675
Status affected
Version < d7bd416d35121c95fe47330e09a5c04adbc5f928
Version bb17d110cbf270d5247a6e261c5ad50e362d1675
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 5.19
Status affected
Version < 5.19
Version 0
Status unaffected
Version <= 5.19.*
Version 5.19.2
Status unaffected
Version <= *
Version 6.0
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.04% 0.094
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string