-
CVE-2022-50289
- EPSS 0.04%
- Veröffentlicht 15.09.2025 14:21:25
- Zuletzt bearbeitet 15.09.2025 15:22:27
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- Teams Watchlist Login
- Unerledigt Login
In the Linux kernel, the following vulnerability has been resolved: ocfs2: fix memory leak in ocfs2_stack_glue_init() ocfs2_table_header should be free in ocfs2_stack_glue_init() if ocfs2_sysfs_init() failed, otherwise kmemleak will report memleak. BUG: memory leak unreferenced object 0xffff88810eeb5800 (size 128): comm "modprobe", pid 4507, jiffies 4296182506 (age 55.888s) hex dump (first 32 bytes): c0 40 14 a0 ff ff ff ff 00 00 00 00 01 00 00 00 .@.............. 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<000000001e59e1cd>] __register_sysctl_table+0xca/0xef0 [<00000000c04f70f7>] 0xffffffffa0050037 [<000000001bd12912>] do_one_initcall+0xdb/0x480 [<0000000064f766c9>] do_init_module+0x1cf/0x680 [<000000002ba52db0>] load_module+0x6441/0x6f20 [<000000009772580d>] __do_sys_finit_module+0x12f/0x1c0 [<00000000380c1f22>] do_syscall_64+0x3f/0x90 [<000000004cf473bc>] entry_SYSCALL_64_after_hwframe+0x63/0xcd
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
0000281f019111526f7abccc61f2746d2eb626ca
Version
3878f110f71a0971ff7acc15dd6db711b6ef37c6
Status
affected
Version <
802abe2bc654e87334e6a0ab6c1adc2b6d5f6394
Version
3878f110f71a0971ff7acc15dd6db711b6ef37c6
Status
affected
Version <
b0822faebd79971617abd495beb2d6f5356b88bf
Version
3878f110f71a0971ff7acc15dd6db711b6ef37c6
Status
affected
Version <
7c8bf45cea9c8d6fb3e14d8cd5ae60e0372f39b7
Version
3878f110f71a0971ff7acc15dd6db711b6ef37c6
Status
affected
Version <
f5f2682d3a34dd8350bf63f232d885fd95f25b92
Version
3878f110f71a0971ff7acc15dd6db711b6ef37c6
Status
affected
Version <
61d68cf2ba79128c48d4b3fa4d10c34dc18ba572
Version
3878f110f71a0971ff7acc15dd6db711b6ef37c6
Status
affected
Version <
6f6c13776cbee4b6a515f4cd3b859f046be4f6f9
Version
3878f110f71a0971ff7acc15dd6db711b6ef37c6
Status
affected
Version <
0b2128b70849f2728949babfc1c760096ef72f5d
Version
3878f110f71a0971ff7acc15dd6db711b6ef37c6
Status
affected
Version <
13b6269dd022aaa69ca8d1df374ab327504121cf
Version
3878f110f71a0971ff7acc15dd6db711b6ef37c6
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
2.6.26
Status
affected
Version <
2.6.26
Version
0
Status
unaffected
Version <=
4.9.*
Version
4.9.337
Status
unaffected
Version <=
4.14.*
Version
4.14.303
Status
unaffected
Version <=
4.19.*
Version
4.19.270
Status
unaffected
Version <=
5.4.*
Version
5.4.229
Status
unaffected
Version <=
5.10.*
Version
5.10.163
Status
unaffected
Version <=
5.15.*
Version
5.15.86
Status
unaffected
Version <=
6.0.*
Version
6.0.16
Status
unaffected
Version <=
6.1.*
Version
6.1.2
Status
unaffected
Version <=
*
Version
6.2
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.04% | 0.126 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|