-

CVE-2022-50474

In the Linux kernel, the following vulnerability has been resolved:

macintosh: fix possible memory leak in macio_add_one_device()

Afer commit 1fa5ae857bb1 ("driver core: get rid of struct device's
bus_id string array"), the name of device is allocated dynamically. It
needs to be freed when of_device_register() fails. Call put_device() to
give up the reference that's taken in device_initialize(), so that it
can be freed in kobject_cleanup() when the refcount hits 0.

macio device is freed in macio_release_dev(), so the kfree() can be
removed.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < 3a866ff6fc2232c8e393cdb55ffb8ce947349e03
Version 1fa5ae857bb14f6046205171d98506d8112dd74e
Status affected
Version < aa9054267366ff0a382d403d17728e21951ddbb9
Version 1fa5ae857bb14f6046205171d98506d8112dd74e
Status affected
Version < 35858b87a943917fa30172aa4bf01ce7adbcb42c
Version 1fa5ae857bb14f6046205171d98506d8112dd74e
Status affected
Version < b29a2f1dd33ae9b94821ab2f4d398b9081786748
Version 1fa5ae857bb14f6046205171d98506d8112dd74e
Status affected
Version < 2ac0a7059b7bcbed35bfffa34a82c9a9e99638ef
Version 1fa5ae857bb14f6046205171d98506d8112dd74e
Status affected
Version < 19ded60b40e86b0903c8d5bd0161437ed5107a8b
Version 1fa5ae857bb14f6046205171d98506d8112dd74e
Status affected
Version < ca765257feb89dacf604ced9cd233db5f865dee0
Version 1fa5ae857bb14f6046205171d98506d8112dd74e
Status affected
Version < 76837e7f6b30da72ad59f56291e22804a219e015
Version 1fa5ae857bb14f6046205171d98506d8112dd74e
Status affected
Version < 5ca86eae55a2f006e6c1edd2029b2cacb6979515
Version 1fa5ae857bb14f6046205171d98506d8112dd74e
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 2.6.30
Status affected
Version < 2.6.30
Version 0
Status unaffected
Version <= 4.9.*
Version 4.9.337
Status unaffected
Version <= 4.14.*
Version 4.14.303
Status unaffected
Version <= 4.19.*
Version 4.19.270
Status unaffected
Version <= 5.4.*
Version 5.4.229
Status unaffected
Version <= 5.10.*
Version 5.10.163
Status unaffected
Version <= 5.15.*
Version 5.15.86
Status unaffected
Version <= 6.0.*
Version 6.0.16
Status unaffected
Version <= 6.1.*
Version 6.1.2
Status unaffected
Version <= *
Version 6.2
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.03% 0.084
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string