-
CVE-2022-50349
- EPSS 0.04%
- Veröffentlicht 16.09.2025 16:11:41
- Zuletzt bearbeitet 17.09.2025 14:18:55
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- Teams Watchlist Login
- Unerledigt Login
In the Linux kernel, the following vulnerability has been resolved: misc: tifm: fix possible memory leak in tifm_7xx1_switch_media() If device_register() returns error in tifm_7xx1_switch_media(), name of kobject which is allocated in dev_set_name() called in device_add() is leaked. Never directly free @dev after calling device_register(), even if it returned an error! Always use put_device() to give up the reference initialized.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
2bbb222a54ff501f77ce593d21b76b79c905045e
Version
2428a8fe2261e901e058d9ea8b6ed7e1b4268b79
Status
affected
Version <
d861b7d41b17942b337d4b87a70de7cd1dc44d4e
Version
2428a8fe2261e901e058d9ea8b6ed7e1b4268b79
Status
affected
Version <
1695b1adcc3a7d985cd22fa3b55761edf3fab50d
Version
2428a8fe2261e901e058d9ea8b6ed7e1b4268b79
Status
affected
Version <
ee2715faf7e7153f5142ed09aacfa89a64d45dcb
Version
2428a8fe2261e901e058d9ea8b6ed7e1b4268b79
Status
affected
Version <
57c857353d5020bdec8284d9c0fee447484fe5e0
Version
2428a8fe2261e901e058d9ea8b6ed7e1b4268b79
Status
affected
Version <
848c45964ded537107e010aaf353aa30a0855387
Version
2428a8fe2261e901e058d9ea8b6ed7e1b4268b79
Status
affected
Version <
35abbc8406cc39e72d3ce85f6e869555afe50d54
Version
2428a8fe2261e901e058d9ea8b6ed7e1b4268b79
Status
affected
Version <
ef843ee20576039126d34d6eb5f45d14c3e6ce18
Version
2428a8fe2261e901e058d9ea8b6ed7e1b4268b79
Status
affected
Version <
fd2c930cf6a5b9176382c15f9acb1996e76e25ad
Version
2428a8fe2261e901e058d9ea8b6ed7e1b4268b79
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
2.6.22
Status
affected
Version <
2.6.22
Version
0
Status
unaffected
Version <=
4.9.*
Version
4.9.337
Status
unaffected
Version <=
4.14.*
Version
4.14.303
Status
unaffected
Version <=
4.19.*
Version
4.19.270
Status
unaffected
Version <=
5.4.*
Version
5.4.229
Status
unaffected
Version <=
5.10.*
Version
5.10.163
Status
unaffected
Version <=
5.15.*
Version
5.15.86
Status
unaffected
Version <=
6.0.*
Version
6.0.16
Status
unaffected
Version <=
6.1.*
Version
6.1.2
Status
unaffected
Version <=
*
Version
6.2
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.04% | 0.126 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|