-
CVE-2022-50119
- EPSS 0.04%
- Published 18.06.2025 11:02:49
- Last modified 18.06.2025 13:47:40
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- Teams watchlist Login
- Open Login
In the Linux kernel, the following vulnerability has been resolved: rpmsg: Fix possible refcount leak in rpmsg_register_device_override() rpmsg_register_device_override need to call put_device to free vch when driver_set_override fails. Fix this by adding a put_device() to the error path.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
≫
Product
Linux
Default Statusunaffected
Version <
280ae5a028ef5d14ef9277746a3026a30aaebe4f
Version
b585daa34a0a852e6d5e553132b411b6a0192d27
Status
affected
Version <
c449b28e437d18ae807479c4ac6b69d87b287c79
Version
c14c6676ad5b78950a45121a7ee6cfb85778e71f
Status
affected
Version <
01e6885b75e25a2dd0726455ef18ef9ce5e7dc87
Version
3d14785980571ebb313a976e589b9d3563adc704
Status
affected
Version <
3fdd5b2bb09fc2b5bf3504778f51c89bb48c097f
Version
5f1bb9f4d4b55c39180329c4e379aa740039eed3
Status
affected
Version <
d4c8bf5635c4bedaf2470761ced1f502b2d5434e
Version
bfd4a664ddfbe12f008efb0b0ab6bf25a8ab2538
Status
affected
Version <
c29335612ff44df979678a38e1f55c62004f421c
Version
bb17d110cbf270d5247a6e261c5ad50e362d1675
Status
affected
Version <
d7bd416d35121c95fe47330e09a5c04adbc5f928
Version
bb17d110cbf270d5247a6e261c5ad50e362d1675
Status
affected
VendorLinux
≫
Product
Linux
Default Statusaffected
Version
5.19
Status
affected
Version <
5.19
Version
0
Status
unaffected
Version <=
5.19.*
Version
5.19.2
Status
unaffected
Version <=
*
Version
6.0
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.04% | 0.094 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|