-
CVE-2022-50282
- EPSS 0.04%
- Veröffentlicht 15.09.2025 14:21:18
- Zuletzt bearbeitet 15.09.2025 15:22:27
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- Teams Watchlist Login
- Unerledigt Login
In the Linux kernel, the following vulnerability has been resolved: chardev: fix error handling in cdev_device_add() While doing fault injection test, I got the following report: ------------[ cut here ]------------ kobject: '(null)' (0000000039956980): is not initialized, yet kobject_put() is being called. WARNING: CPU: 3 PID: 6306 at kobject_put+0x23d/0x4e0 CPU: 3 PID: 6306 Comm: 283 Tainted: G W 6.1.0-rc2-00005-g307c1086d7c9 #1253 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.13.0-1ubuntu1.1 04/01/2014 RIP: 0010:kobject_put+0x23d/0x4e0 Call Trace: <TASK> cdev_device_add+0x15e/0x1b0 __iio_device_register+0x13b4/0x1af0 [industrialio] __devm_iio_device_register+0x22/0x90 [industrialio] max517_probe+0x3d8/0x6b4 [max517] i2c_device_probe+0xa81/0xc00 When device_add() is injected fault and returns error, if dev->devt is not set, cdev_add() is not called, cdev_del() is not needed. Fix this by checking dev->devt in error path.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
5d2146889fad4cb9e6c13e790d4cfd871486eca8
Version
da97a80a657d1b1b50ef633e8ff5dbf0d417fc8d
Status
affected
Version <
6acf8597c5b04f455ee0649e11e5f3bcd28f381e
Version
233ed09d7fdacf592ee91e6c97ce5f4364fbe7c0
Status
affected
Version <
34d17b39bceef25e4cf9805cd59250ae05d0a139
Version
233ed09d7fdacf592ee91e6c97ce5f4364fbe7c0
Status
affected
Version <
d85b5247a79355b8432bfd9ac871f96117f750d4
Version
233ed09d7fdacf592ee91e6c97ce5f4364fbe7c0
Status
affected
Version <
c46db6088bccff5115674d583fef46ede80077a2
Version
233ed09d7fdacf592ee91e6c97ce5f4364fbe7c0
Status
affected
Version <
28dc61cc49c6e995121c6d86bef4b73df78dda80
Version
233ed09d7fdacf592ee91e6c97ce5f4364fbe7c0
Status
affected
Version <
b5de1eac71fec1af7723f1083d23a24789fd795c
Version
233ed09d7fdacf592ee91e6c97ce5f4364fbe7c0
Status
affected
Version <
85a5660491b507d33662b8e81c142e6041e642eb
Version
233ed09d7fdacf592ee91e6c97ce5f4364fbe7c0
Status
affected
Version <
11fa7fefe3d8fac7da56bc9aa3dd5fb3081ca797
Version
233ed09d7fdacf592ee91e6c97ce5f4364fbe7c0
Status
affected
Version
f78b54e7d83c7879f9a6e49e6724019ca34177cc
Status
affected
Version
d79d7d5c878809964da537336dad5ff55fa1605e
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
4.12
Status
affected
Version <
4.12
Version
0
Status
unaffected
Version <=
4.9.*
Version
4.9.337
Status
unaffected
Version <=
4.14.*
Version
4.14.303
Status
unaffected
Version <=
4.19.*
Version
4.19.270
Status
unaffected
Version <=
5.4.*
Version
5.4.229
Status
unaffected
Version <=
5.10.*
Version
5.10.163
Status
unaffected
Version <=
5.15.*
Version
5.15.86
Status
unaffected
Version <=
6.0.*
Version
6.0.16
Status
unaffected
Version <=
6.1.*
Version
6.1.2
Status
unaffected
Version <=
*
Version
6.2
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.04% | 0.126 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|