-
CVE-2022-50311
- EPSS 0.03%
- Veröffentlicht 15.09.2025 14:46:06
- Zuletzt bearbeitet 15.09.2025 15:22:27
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- Teams Watchlist Login
- Unerledigt Login
In the Linux kernel, the following vulnerability has been resolved: cxl: Fix refcount leak in cxl_calc_capp_routing of_get_next_parent() returns a node pointer with refcount incremented, we should use of_node_put() on it when not need anymore. This function only calls of_node_put() in normal path, missing it in the error path. Add missing of_node_put() to avoid refcount leak.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
c9bebc503881c1391f6c4f820134884adecf1519
Version
f24be42aab37c6d07c05126673138e06223a6399
Status
affected
Version <
ee870f72465015327ad96204b0e92450d04870cd
Version
f24be42aab37c6d07c05126673138e06223a6399
Status
affected
Version <
f2d60f6ba173cded65081cee690b67802395a479
Version
f24be42aab37c6d07c05126673138e06223a6399
Status
affected
Version <
81c8bbf5b2b5f0c8030fff1716c00849cda8571a
Version
f24be42aab37c6d07c05126673138e06223a6399
Status
affected
Version <
6a310e8db5409676b4b3e6c1f54dff174e4fd04d
Version
f24be42aab37c6d07c05126673138e06223a6399
Status
affected
Version <
651e8bc9d0418c20a1989b7c078c64c2a6346fa3
Version
f24be42aab37c6d07c05126673138e06223a6399
Status
affected
Version <
2d7b6580384e6d65419933ddc525bd176095da54
Version
f24be42aab37c6d07c05126673138e06223a6399
Status
affected
Version <
1d09697ff22908ae487fc8c4fbde1811732be523
Version
f24be42aab37c6d07c05126673138e06223a6399
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
4.12
Status
affected
Version <
4.12
Version
0
Status
unaffected
Version <=
4.14.*
Version
4.14.303
Status
unaffected
Version <=
4.19.*
Version
4.19.270
Status
unaffected
Version <=
5.4.*
Version
5.4.229
Status
unaffected
Version <=
5.10.*
Version
5.10.163
Status
unaffected
Version <=
5.15.*
Version
5.15.86
Status
unaffected
Version <=
6.0.*
Version
6.0.16
Status
unaffected
Version <=
6.1.*
Version
6.1.2
Status
unaffected
Version <=
*
Version
6.2
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.03% | 0.078 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|