-
CVE-2022-50282
- EPSS 0.04%
- Published 15.09.2025 14:21:18
- Last modified 15.09.2025 15:22:27
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- Teams watchlist Login
- Open Login
In the Linux kernel, the following vulnerability has been resolved: chardev: fix error handling in cdev_device_add() While doing fault injection test, I got the following report: ------------[ cut here ]------------ kobject: '(null)' (0000000039956980): is not initialized, yet kobject_put() is being called. WARNING: CPU: 3 PID: 6306 at kobject_put+0x23d/0x4e0 CPU: 3 PID: 6306 Comm: 283 Tainted: G W 6.1.0-rc2-00005-g307c1086d7c9 #1253 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.13.0-1ubuntu1.1 04/01/2014 RIP: 0010:kobject_put+0x23d/0x4e0 Call Trace: <TASK> cdev_device_add+0x15e/0x1b0 __iio_device_register+0x13b4/0x1af0 [industrialio] __devm_iio_device_register+0x22/0x90 [industrialio] max517_probe+0x3d8/0x6b4 [max517] i2c_device_probe+0xa81/0xc00 When device_add() is injected fault and returns error, if dev->devt is not set, cdev_add() is not called, cdev_del() is not needed. Fix this by checking dev->devt in error path.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
≫
Product
Linux
Default Statusunaffected
Version <
5d2146889fad4cb9e6c13e790d4cfd871486eca8
Version
da97a80a657d1b1b50ef633e8ff5dbf0d417fc8d
Status
affected
Version <
6acf8597c5b04f455ee0649e11e5f3bcd28f381e
Version
233ed09d7fdacf592ee91e6c97ce5f4364fbe7c0
Status
affected
Version <
34d17b39bceef25e4cf9805cd59250ae05d0a139
Version
233ed09d7fdacf592ee91e6c97ce5f4364fbe7c0
Status
affected
Version <
d85b5247a79355b8432bfd9ac871f96117f750d4
Version
233ed09d7fdacf592ee91e6c97ce5f4364fbe7c0
Status
affected
Version <
c46db6088bccff5115674d583fef46ede80077a2
Version
233ed09d7fdacf592ee91e6c97ce5f4364fbe7c0
Status
affected
Version <
28dc61cc49c6e995121c6d86bef4b73df78dda80
Version
233ed09d7fdacf592ee91e6c97ce5f4364fbe7c0
Status
affected
Version <
b5de1eac71fec1af7723f1083d23a24789fd795c
Version
233ed09d7fdacf592ee91e6c97ce5f4364fbe7c0
Status
affected
Version <
85a5660491b507d33662b8e81c142e6041e642eb
Version
233ed09d7fdacf592ee91e6c97ce5f4364fbe7c0
Status
affected
Version <
11fa7fefe3d8fac7da56bc9aa3dd5fb3081ca797
Version
233ed09d7fdacf592ee91e6c97ce5f4364fbe7c0
Status
affected
Version
f78b54e7d83c7879f9a6e49e6724019ca34177cc
Status
affected
Version
d79d7d5c878809964da537336dad5ff55fa1605e
Status
affected
VendorLinux
≫
Product
Linux
Default Statusaffected
Version
4.12
Status
affected
Version <
4.12
Version
0
Status
unaffected
Version <=
4.9.*
Version
4.9.337
Status
unaffected
Version <=
4.14.*
Version
4.14.303
Status
unaffected
Version <=
4.19.*
Version
4.19.270
Status
unaffected
Version <=
5.4.*
Version
5.4.229
Status
unaffected
Version <=
5.10.*
Version
5.10.163
Status
unaffected
Version <=
5.15.*
Version
5.15.86
Status
unaffected
Version <=
6.0.*
Version
6.0.16
Status
unaffected
Version <=
6.1.*
Version
6.1.2
Status
unaffected
Version <=
*
Version
6.2
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.04% | 0.126 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|