-
CVE-2022-50289
- EPSS 0.04%
- Published 15.09.2025 14:21:25
- Last modified 15.09.2025 15:22:27
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- Teams watchlist Login
- Open Login
In the Linux kernel, the following vulnerability has been resolved: ocfs2: fix memory leak in ocfs2_stack_glue_init() ocfs2_table_header should be free in ocfs2_stack_glue_init() if ocfs2_sysfs_init() failed, otherwise kmemleak will report memleak. BUG: memory leak unreferenced object 0xffff88810eeb5800 (size 128): comm "modprobe", pid 4507, jiffies 4296182506 (age 55.888s) hex dump (first 32 bytes): c0 40 14 a0 ff ff ff ff 00 00 00 00 01 00 00 00 .@.............. 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<000000001e59e1cd>] __register_sysctl_table+0xca/0xef0 [<00000000c04f70f7>] 0xffffffffa0050037 [<000000001bd12912>] do_one_initcall+0xdb/0x480 [<0000000064f766c9>] do_init_module+0x1cf/0x680 [<000000002ba52db0>] load_module+0x6441/0x6f20 [<000000009772580d>] __do_sys_finit_module+0x12f/0x1c0 [<00000000380c1f22>] do_syscall_64+0x3f/0x90 [<000000004cf473bc>] entry_SYSCALL_64_after_hwframe+0x63/0xcd
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
≫
Product
Linux
Default Statusunaffected
Version <
0000281f019111526f7abccc61f2746d2eb626ca
Version
3878f110f71a0971ff7acc15dd6db711b6ef37c6
Status
affected
Version <
802abe2bc654e87334e6a0ab6c1adc2b6d5f6394
Version
3878f110f71a0971ff7acc15dd6db711b6ef37c6
Status
affected
Version <
b0822faebd79971617abd495beb2d6f5356b88bf
Version
3878f110f71a0971ff7acc15dd6db711b6ef37c6
Status
affected
Version <
7c8bf45cea9c8d6fb3e14d8cd5ae60e0372f39b7
Version
3878f110f71a0971ff7acc15dd6db711b6ef37c6
Status
affected
Version <
f5f2682d3a34dd8350bf63f232d885fd95f25b92
Version
3878f110f71a0971ff7acc15dd6db711b6ef37c6
Status
affected
Version <
61d68cf2ba79128c48d4b3fa4d10c34dc18ba572
Version
3878f110f71a0971ff7acc15dd6db711b6ef37c6
Status
affected
Version <
6f6c13776cbee4b6a515f4cd3b859f046be4f6f9
Version
3878f110f71a0971ff7acc15dd6db711b6ef37c6
Status
affected
Version <
0b2128b70849f2728949babfc1c760096ef72f5d
Version
3878f110f71a0971ff7acc15dd6db711b6ef37c6
Status
affected
Version <
13b6269dd022aaa69ca8d1df374ab327504121cf
Version
3878f110f71a0971ff7acc15dd6db711b6ef37c6
Status
affected
VendorLinux
≫
Product
Linux
Default Statusaffected
Version
2.6.26
Status
affected
Version <
2.6.26
Version
0
Status
unaffected
Version <=
4.9.*
Version
4.9.337
Status
unaffected
Version <=
4.14.*
Version
4.14.303
Status
unaffected
Version <=
4.19.*
Version
4.19.270
Status
unaffected
Version <=
5.4.*
Version
5.4.229
Status
unaffected
Version <=
5.10.*
Version
5.10.163
Status
unaffected
Version <=
5.15.*
Version
5.15.86
Status
unaffected
Version <=
6.0.*
Version
6.0.16
Status
unaffected
Version <=
6.1.*
Version
6.1.2
Status
unaffected
Version <=
*
Version
6.2
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.04% | 0.126 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|