-

CVE-2022-50278

In the Linux kernel, the following vulnerability has been resolved:

PNP: fix name memory leak in pnp_alloc_dev()

After commit 1fa5ae857bb1 ("driver core: get rid of struct device's
bus_id string array"), the name of device is allocated dynamically,
move dev_set_name() after pnp_add_id() to avoid memory leak.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < ea77b4b761cd75e5456f677311babfa0418f289a
Version 1fa5ae857bb14f6046205171d98506d8112dd74e
Status affected
Version < 693a0c13c1f0c0fcaa1e38cb806cc0789bd415aa
Version 1fa5ae857bb14f6046205171d98506d8112dd74e
Status affected
Version < bbcf772216aa237036cc3ae3158288d0a95aaf4d
Version 1fa5ae857bb14f6046205171d98506d8112dd74e
Status affected
Version < 81b024df4755e6bb6993b786584eca6eabbb9791
Version 1fa5ae857bb14f6046205171d98506d8112dd74e
Status affected
Version < dac87e295cddc8ab316cff14ab2071b5221d84fa
Version 1fa5ae857bb14f6046205171d98506d8112dd74e
Status affected
Version < c12b314bb23dc0c83e03402cc84574700947e3b2
Version 1fa5ae857bb14f6046205171d98506d8112dd74e
Status affected
Version < 1f50c7497a5f89de0c31f2edf086af41ff834320
Version 1fa5ae857bb14f6046205171d98506d8112dd74e
Status affected
Version < 290dd73b943c95c006df973257076ff163adf4d0
Version 1fa5ae857bb14f6046205171d98506d8112dd74e
Status affected
Version < 110d7b0325c55ff3620073ba4201845f59e22ebf
Version 1fa5ae857bb14f6046205171d98506d8112dd74e
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 2.6.30
Status affected
Version < 2.6.30
Version 0
Status unaffected
Version <= 4.9.*
Version 4.9.337
Status unaffected
Version <= 4.14.*
Version 4.14.303
Status unaffected
Version <= 4.19.*
Version 4.19.270
Status unaffected
Version <= 5.4.*
Version 5.4.229
Status unaffected
Version <= 5.10.*
Version 5.10.163
Status unaffected
Version <= 5.15.*
Version 5.15.86
Status unaffected
Version <= 6.0.*
Version 6.0.16
Status unaffected
Version <= 6.1.*
Version 6.1.2
Status unaffected
Version <= *
Version 6.2
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.04% 0.126
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string