-
CVE-2022-50197
- EPSS 0.04%
- Veröffentlicht 18.06.2025 11:03:40
- Zuletzt bearbeitet 18.06.2025 13:47:40
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- Teams Watchlist Login
- Unerledigt Login
In the Linux kernel, the following vulnerability has been resolved: cpufreq: zynq: Fix refcount leak in zynq_get_revision of_find_compatible_node() returns a node pointer with refcount incremented, we should use of_node_put() on it when done. Add missing of_node_put() to avoid refcount leak.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
f52c9be1779d70037ae300762d19b08fe3656237
Version
00f7dc636366f72474b1896f4990b3c086cd2c6d
Status
affected
Version <
dcbb974254d2a27240c2e50185afdde90f923feb
Version
00f7dc636366f72474b1896f4990b3c086cd2c6d
Status
affected
Version <
a530fa52d4fdffc5f010f90c05ac63019b8ff5f8
Version
00f7dc636366f72474b1896f4990b3c086cd2c6d
Status
affected
Version <
22e6d8bcde8e66b64f46bf9bd2d3d0f88d40c39f
Version
00f7dc636366f72474b1896f4990b3c086cd2c6d
Status
affected
Version <
179034fb108e3655142f2af0c309cef171c34d68
Version
00f7dc636366f72474b1896f4990b3c086cd2c6d
Status
affected
Version <
ecefd22d5db7ccb8bec2646e5d25e058fc33162a
Version
00f7dc636366f72474b1896f4990b3c086cd2c6d
Status
affected
Version <
3b01353f1825151a29d08e0868b2bf01e1116ab5
Version
00f7dc636366f72474b1896f4990b3c086cd2c6d
Status
affected
Version <
d1ff2559cef0f6f8d97fba6337b28adb10689e16
Version
00f7dc636366f72474b1896f4990b3c086cd2c6d
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
3.16
Status
affected
Version <
3.16
Version
0
Status
unaffected
Version <=
4.14.*
Version
4.14.291
Status
unaffected
Version <=
4.19.*
Version
4.19.256
Status
unaffected
Version <=
5.4.*
Version
5.4.211
Status
unaffected
Version <=
5.10.*
Version
5.10.137
Status
unaffected
Version <=
5.15.*
Version
5.15.61
Status
unaffected
Version <=
5.18.*
Version
5.18.18
Status
unaffected
Version <=
5.19.*
Version
5.19.2
Status
unaffected
Version <=
*
Version
6.0
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.04% | 0.094 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|