-
CVE-2022-50431
- EPSS 0.03%
- Veröffentlicht 01.10.2025 12:15:34
- Zuletzt bearbeitet 02.10.2025 19:12:17
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- Teams Watchlist Login
- Unerledigt Login
In the Linux kernel, the following vulnerability has been resolved: ALSA: aoa: i2sbus: fix possible memory leak in i2sbus_add_dev() dev_set_name() in soundbus_add_one() allocates memory for name, it need be freed when of_device_register() fails, call soundbus_dev_put() to give up the reference that hold in device_initialize(), so that it can be freed in kobject_cleanup() when the refcount hit to 0. And other resources are also freed in i2sbus_release_dev(), so it can return 0 directly.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
fd410d24665e4efb3c1796797181265efe553e9c
Version
f3d9478b2ce468c3115b02ecae7e975990697f15
Status
affected
Version <
802532a50acf501fdafe38a84ca2aa886d68af68
Version
f3d9478b2ce468c3115b02ecae7e975990697f15
Status
affected
Version <
027fee10e3a400cf6f3237374a1248da1082807b
Version
f3d9478b2ce468c3115b02ecae7e975990697f15
Status
affected
Version <
5bdea674534153110b90d70b02f2fbaf48b2c0eb
Version
f3d9478b2ce468c3115b02ecae7e975990697f15
Status
affected
Version <
ce6fd1c382a38b75557db85a2fe99d285540a03d
Version
f3d9478b2ce468c3115b02ecae7e975990697f15
Status
affected
Version <
e81d7826b8f40430a1ea1b330e24d9a9eb4512c4
Version
f3d9478b2ce468c3115b02ecae7e975990697f15
Status
affected
Version <
c7524279c8ddc7dbf3463bec70e0289097959944
Version
f3d9478b2ce468c3115b02ecae7e975990697f15
Status
affected
Version <
4a4c8482e370d697738a78dcd7bf2780832cb712
Version
f3d9478b2ce468c3115b02ecae7e975990697f15
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
2.6.18
Status
affected
Version <
2.6.18
Version
0
Status
unaffected
Version <=
4.9.*
Version
4.9.332
Status
unaffected
Version <=
4.14.*
Version
4.14.298
Status
unaffected
Version <=
4.19.*
Version
4.19.264
Status
unaffected
Version <=
5.4.*
Version
5.4.223
Status
unaffected
Version <=
5.10.*
Version
5.10.153
Status
unaffected
Version <=
5.15.*
Version
5.15.77
Status
unaffected
Version <=
6.0.*
Version
6.0.7
Status
unaffected
Version <=
*
Version
6.1
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.03% | 0.081 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|