-
CVE-2022-50194
- EPSS 0.04%
- Veröffentlicht 18.06.2025 11:03:38
- Zuletzt bearbeitet 18.06.2025 13:47:40
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- Teams Watchlist Login
- Unerledigt Login
In the Linux kernel, the following vulnerability has been resolved: soc: qcom: aoss: Fix refcount leak in qmp_cooling_devices_register Every iteration of for_each_available_child_of_node() decrements the reference count of the previous node. When breaking early from a for_each_available_child_of_node() loop, we need to explicitly call of_node_put() on the child node. Add missing of_node_put() to avoid refcount leak.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
bc73c72a856c26df7410ddf15f42257cb4960fe9
Version
05589b30b21ac0273970b61edd50c07d2ba156af
Status
affected
Version <
97713ed9b6cc4abaa2dcc8357113c56520dc6d7f
Version
05589b30b21ac0273970b61edd50c07d2ba156af
Status
affected
Version <
053543ac1d095132fcfd1263805d6e25afbdc6a8
Version
05589b30b21ac0273970b61edd50c07d2ba156af
Status
affected
Version <
ca83c61a6ccf3934cf8d01d5ade30a5034993a86
Version
05589b30b21ac0273970b61edd50c07d2ba156af
Status
affected
Version <
591f0697ccbac33760d3bb1ad96a5ba2b76ae9f0
Version
05589b30b21ac0273970b61edd50c07d2ba156af
Status
affected
Version <
e6e0951414a314e7db3e9e24fd924b3e15515288
Version
05589b30b21ac0273970b61edd50c07d2ba156af
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
5.4
Status
affected
Version <
5.4
Version
0
Status
unaffected
Version <=
5.4.*
Version
5.4.211
Status
unaffected
Version <=
5.10.*
Version
5.10.137
Status
unaffected
Version <=
5.15.*
Version
5.15.61
Status
unaffected
Version <=
5.18.*
Version
5.18.18
Status
unaffected
Version <=
5.19.*
Version
5.19.2
Status
unaffected
Version <=
*
Version
6.0
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.04% | 0.094 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|