-
CVE-2022-50122
- EPSS 0.04%
- Veröffentlicht 18.06.2025 11:02:51
- Zuletzt bearbeitet 18.06.2025 13:47:40
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- Teams Watchlist Login
- Unerledigt Login
In the Linux kernel, the following vulnerability has been resolved: ASoC: mediatek: mt8173-rt5650: Fix refcount leak in mt8173_rt5650_dev_probe of_parse_phandle() returns a node pointer with refcount incremented, we should use of_node_put() on it when not need anymore. Fix refcount leak in some error paths.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
06ace427953f5036b64aed658f0055f65d76fd27
Version
0f83f9296d5c91d08cf46cf1ba8a17fb870dedf0
Status
affected
Version <
e024a24fb264523149658c10c76bb363b3d0004d
Version
0f83f9296d5c91d08cf46cf1ba8a17fb870dedf0
Status
affected
Version <
79f566907d27abbd7600cebe51def5081d5796b5
Version
0f83f9296d5c91d08cf46cf1ba8a17fb870dedf0
Status
affected
Version <
403d46971936f9f704b91cecffe66e44aa39e915
Version
0f83f9296d5c91d08cf46cf1ba8a17fb870dedf0
Status
affected
Version <
994f2edeeb2114bb22b62741cb8fb030fc7e5441
Version
0f83f9296d5c91d08cf46cf1ba8a17fb870dedf0
Status
affected
Version <
e38e4952ac7a316c9002af30980d6aa850214474
Version
0f83f9296d5c91d08cf46cf1ba8a17fb870dedf0
Status
affected
Version <
5ec83aa7a9e5bcca80ccd49978916feb4e0ffc07
Version
0f83f9296d5c91d08cf46cf1ba8a17fb870dedf0
Status
affected
Version <
efe2178d1a32492f99e7f1f2568eea5c88a85729
Version
0f83f9296d5c91d08cf46cf1ba8a17fb870dedf0
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
4.6
Status
affected
Version <
4.6
Version
0
Status
unaffected
Version <=
4.14.*
Version
4.14.291
Status
unaffected
Version <=
4.19.*
Version
4.19.256
Status
unaffected
Version <=
5.4.*
Version
5.4.211
Status
unaffected
Version <=
5.10.*
Version
5.10.137
Status
unaffected
Version <=
5.15.*
Version
5.15.61
Status
unaffected
Version <=
5.18.*
Version
5.18.18
Status
unaffected
Version <=
5.19.*
Version
5.19.2
Status
unaffected
Version <=
*
Version
6.0
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.04% | 0.094 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|