-
CVE-2022-50349
- EPSS 0.04%
- Published 16.09.2025 16:11:41
- Last modified 17.09.2025 14:18:55
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- Teams watchlist Login
- Open Login
In the Linux kernel, the following vulnerability has been resolved: misc: tifm: fix possible memory leak in tifm_7xx1_switch_media() If device_register() returns error in tifm_7xx1_switch_media(), name of kobject which is allocated in dev_set_name() called in device_add() is leaked. Never directly free @dev after calling device_register(), even if it returned an error! Always use put_device() to give up the reference initialized.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
≫
Product
Linux
Default Statusunaffected
Version <
2bbb222a54ff501f77ce593d21b76b79c905045e
Version
2428a8fe2261e901e058d9ea8b6ed7e1b4268b79
Status
affected
Version <
d861b7d41b17942b337d4b87a70de7cd1dc44d4e
Version
2428a8fe2261e901e058d9ea8b6ed7e1b4268b79
Status
affected
Version <
1695b1adcc3a7d985cd22fa3b55761edf3fab50d
Version
2428a8fe2261e901e058d9ea8b6ed7e1b4268b79
Status
affected
Version <
ee2715faf7e7153f5142ed09aacfa89a64d45dcb
Version
2428a8fe2261e901e058d9ea8b6ed7e1b4268b79
Status
affected
Version <
57c857353d5020bdec8284d9c0fee447484fe5e0
Version
2428a8fe2261e901e058d9ea8b6ed7e1b4268b79
Status
affected
Version <
848c45964ded537107e010aaf353aa30a0855387
Version
2428a8fe2261e901e058d9ea8b6ed7e1b4268b79
Status
affected
Version <
35abbc8406cc39e72d3ce85f6e869555afe50d54
Version
2428a8fe2261e901e058d9ea8b6ed7e1b4268b79
Status
affected
Version <
ef843ee20576039126d34d6eb5f45d14c3e6ce18
Version
2428a8fe2261e901e058d9ea8b6ed7e1b4268b79
Status
affected
Version <
fd2c930cf6a5b9176382c15f9acb1996e76e25ad
Version
2428a8fe2261e901e058d9ea8b6ed7e1b4268b79
Status
affected
VendorLinux
≫
Product
Linux
Default Statusaffected
Version
2.6.22
Status
affected
Version <
2.6.22
Version
0
Status
unaffected
Version <=
4.9.*
Version
4.9.337
Status
unaffected
Version <=
4.14.*
Version
4.14.303
Status
unaffected
Version <=
4.19.*
Version
4.19.270
Status
unaffected
Version <=
5.4.*
Version
5.4.229
Status
unaffected
Version <=
5.10.*
Version
5.10.163
Status
unaffected
Version <=
5.15.*
Version
5.15.86
Status
unaffected
Version <=
6.0.*
Version
6.0.16
Status
unaffected
Version <=
6.1.*
Version
6.1.2
Status
unaffected
Version <=
*
Version
6.2
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.04% | 0.126 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|