-
CVE-2022-50480
- EPSS 0.02%
- Veröffentlicht 04.10.2025 15:16:39
- Zuletzt bearbeitet 06.10.2025 14:56:47
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- Teams Watchlist Login
- Unerledigt Login
In the Linux kernel, the following vulnerability has been resolved: memory: pl353-smc: Fix refcount leak bug in pl353_smc_probe() The break of for_each_available_child_of_node() needs a corresponding of_node_put() when the reference 'child' is not used anymore. Here we do not need to call of_node_put() in fail path as '!match' means no break. While the of_platform_device_create() will created a new reference by 'child' but it has considered the refcounting.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
b37f4a711e5d4bf3608ccbc6de82b52e92b441a0
Version
fee10bd2267868f2a3e7ba008ef7665aac5e4412
Status
affected
Version <
fde46754d5483bc398018bbec3c8ef5c55219e67
Version
fee10bd2267868f2a3e7ba008ef7665aac5e4412
Status
affected
Version <
566b143aa5112a0c2784e20603778518bb799537
Version
fee10bd2267868f2a3e7ba008ef7665aac5e4412
Status
affected
Version <
44db35ceb94756ba513dcf6b69bf9e949b28469c
Version
fee10bd2267868f2a3e7ba008ef7665aac5e4412
Status
affected
Version <
49605dc25e7fb33bf8b671279d4468531da90f89
Version
fee10bd2267868f2a3e7ba008ef7665aac5e4412
Status
affected
Version <
61b3c876c1cbdb1efd1f52a1f348580e6e14efb6
Version
fee10bd2267868f2a3e7ba008ef7665aac5e4412
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
5.0
Status
affected
Version <
5.0
Version
0
Status
unaffected
Version <=
5.4.*
Version
5.4.220
Status
unaffected
Version <=
5.10.*
Version
5.10.150
Status
unaffected
Version <=
5.15.*
Version
5.15.75
Status
unaffected
Version <=
5.19.*
Version
5.19.17
Status
unaffected
Version <=
6.0.*
Version
6.0.3
Status
unaffected
Version <=
*
Version
6.1
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.02% | 0.053 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|