-
CVE-2022-50415
- EPSS 0.04%
- Published 18.09.2025 16:15:44
- Last modified 19.09.2025 16:00:27
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- Teams watchlist Login
- Open Login
In the Linux kernel, the following vulnerability has been resolved: parisc: led: Fix potential null-ptr-deref in start_task() start_task() calls create_singlethread_workqueue() and not checked the ret value, which may return NULL. And a null-ptr-deref may happen: start_task() create_singlethread_workqueue() # failed, led_wq is NULL queue_delayed_work() queue_delayed_work_on() __queue_delayed_work() # warning here, but continue __queue_work() # access wq->flags, null-ptr-deref Check the ret value and return -ENOMEM if it is NULL.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
≫
Product
Linux
Default Statusunaffected
Version <
c6db0c32f39684c89c97bc1ba1c9c4249ca09e48
Version
3499495205a676d85fcc2f3c28e35ec9b43c47e3
Status
affected
Version <
fc6d0f65f22040c6cc8a5ce032bf90252629de50
Version
3499495205a676d85fcc2f3c28e35ec9b43c47e3
Status
affected
Version <
fc307b2905a3dd75c50a53b4d87ac9c912fb7c4e
Version
3499495205a676d85fcc2f3c28e35ec9b43c47e3
Status
affected
Version <
5e4500454d75dd249be4695d83afa3ba0724c37e
Version
3499495205a676d85fcc2f3c28e35ec9b43c47e3
Status
affected
Version <
3505c187b86136250b39e62c72a3a70435277af6
Version
3499495205a676d85fcc2f3c28e35ec9b43c47e3
Status
affected
Version <
ac838c663ba1fd6bff35a817fd89a47ab55e88e0
Version
3499495205a676d85fcc2f3c28e35ec9b43c47e3
Status
affected
Version <
77f8b628affaec692d83ad8bfa3520db8a0cc493
Version
3499495205a676d85fcc2f3c28e35ec9b43c47e3
Status
affected
Version <
67c98fec87ed76b1feb2ae810051afd88dfa9df6
Version
3499495205a676d85fcc2f3c28e35ec9b43c47e3
Status
affected
Version <
41f563ab3c33698bdfc3403c7c2e6c94e73681e4
Version
3499495205a676d85fcc2f3c28e35ec9b43c47e3
Status
affected
VendorLinux
≫
Product
Linux
Default Statusaffected
Version
2.6.15
Status
affected
Version <
2.6.15
Version
0
Status
unaffected
Version <=
4.9.*
Version
4.9.337
Status
unaffected
Version <=
4.14.*
Version
4.14.303
Status
unaffected
Version <=
4.19.*
Version
4.19.270
Status
unaffected
Version <=
5.4.*
Version
5.4.229
Status
unaffected
Version <=
5.10.*
Version
5.10.163
Status
unaffected
Version <=
5.15.*
Version
5.15.87
Status
unaffected
Version <=
6.0.*
Version
6.0.18
Status
unaffected
Version <=
6.1.*
Version
6.1.4
Status
unaffected
Version <=
*
Version
6.2
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.04% | 0.127 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|