-
CVE-2022-50331
- EPSS 0.02%
- Published 15.09.2025 14:49:41
- Last modified 15.09.2025 15:22:27
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- Teams watchlist Login
- Open Login
In the Linux kernel, the following vulnerability has been resolved: wwan_hwsim: fix possible memory leak in wwan_hwsim_dev_new() Inject fault while probing module, if device_register() fails, but the refcount of kobject is not decreased to 0, the name allocated in dev_set_name() is leaked. Fix this by calling put_device(), so that name can be freed in callback function kobject_cleanup(). unreferenced object 0xffff88810152ad20 (size 8): comm "modprobe", pid 252, jiffies 4294849206 (age 22.713s) hex dump (first 8 bytes): 68 77 73 69 6d 30 00 ff hwsim0.. backtrace: [<000000009c3504ed>] __kmalloc_node_track_caller+0x44/0x1b0 [<00000000c0228a5e>] kvasprintf+0xb5/0x140 [<00000000cff8c21f>] kvasprintf_const+0x55/0x180 [<0000000055a1e073>] kobject_set_name_vargs+0x56/0x150 [<000000000a80b139>] dev_set_name+0xab/0xe0
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
≫
Product
Linux
Default Statusunaffected
Version <
50c31fa952309536c6e4461ff815ddccc8dff9d5
Version
f36a111a74e71edbba27d4c0cf3d7bbccc172108
Status
affected
Version <
d87973314aba6de80a49f4271dd9be4ddc08e729
Version
f36a111a74e71edbba27d4c0cf3d7bbccc172108
Status
affected
Version <
258ad2fe5ede773625adfda88b173f4123e59f45
Version
f36a111a74e71edbba27d4c0cf3d7bbccc172108
Status
affected
VendorLinux
≫
Product
Linux
Default Statusaffected
Version
5.14
Status
affected
Version <
5.14
Version
0
Status
unaffected
Version <=
5.15.*
Version
5.15.76
Status
unaffected
Version <=
6.0.*
Version
6.0.6
Status
unaffected
Version <=
*
Version
6.1
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.02% | 0.043 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|