-
CVE-2022-50462
- EPSS 0.04%
- Published 01.10.2025 12:15:39
- Last modified 02.10.2025 19:12:17
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- Teams watchlist Login
- Open Login
In the Linux kernel, the following vulnerability has been resolved: MIPS: vpe-mt: fix possible memory leak while module exiting Afer commit 1fa5ae857bb1 ("driver core: get rid of struct device's bus_id string array"), the name of device is allocated dynamically, it need be freed when module exiting, call put_device() to give up reference, so that it can be freed in kobject_cleanup() when the refcount hit to 0. The vpe_device is static, so remove kfree() from vpe_device_release().
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
≫
Product
Linux
Default Statusunaffected
Version <
170e9913c2ed5cfc37c0adf0fdbd368d2d8d8168
Version
1fa5ae857bb14f6046205171d98506d8112dd74e
Status
affected
Version <
9d180e0bb21c57bd6cca2adeb672d3b522e910b5
Version
1fa5ae857bb14f6046205171d98506d8112dd74e
Status
affected
Version <
851ae5640875f06494e40002cd503b11a634c6fb
Version
1fa5ae857bb14f6046205171d98506d8112dd74e
Status
affected
Version <
b3325a443525e3b89151879b834519b21c5e3011
Version
1fa5ae857bb14f6046205171d98506d8112dd74e
Status
affected
Version <
48d42f4464d713fbdd79f334fdcd6e5be534cc67
Version
1fa5ae857bb14f6046205171d98506d8112dd74e
Status
affected
Version <
e820a8192ff68570100347855b567512aec43819
Version
1fa5ae857bb14f6046205171d98506d8112dd74e
Status
affected
Version <
b191dde84e40624d5577f64db0ec922c5c0ec57c
Version
1fa5ae857bb14f6046205171d98506d8112dd74e
Status
affected
Version <
ab3d47c1fd0202821abd473ca87580faafd47847
Version
1fa5ae857bb14f6046205171d98506d8112dd74e
Status
affected
Version <
5822e8cc84ee37338ab0bdc3124f6eec04dc232d
Version
1fa5ae857bb14f6046205171d98506d8112dd74e
Status
affected
VendorLinux
≫
Product
Linux
Default Statusaffected
Version
2.6.30
Status
affected
Version <
2.6.30
Version
0
Status
unaffected
Version <=
4.9.*
Version
4.9.337
Status
unaffected
Version <=
4.14.*
Version
4.14.303
Status
unaffected
Version <=
4.19.*
Version
4.19.270
Status
unaffected
Version <=
5.4.*
Version
5.4.229
Status
unaffected
Version <=
5.10.*
Version
5.10.163
Status
unaffected
Version <=
5.15.*
Version
5.15.86
Status
unaffected
Version <=
6.0.*
Version
6.0.16
Status
unaffected
Version <=
6.1.*
Version
6.1.2
Status
unaffected
Version <=
*
Version
6.2
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.04% | 0.129 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|