-

CVE-2022-50481

In the Linux kernel, the following vulnerability has been resolved:

cxl: fix possible null-ptr-deref in cxl_guest_init_afu|adapter()

If device_register() fails in cxl_register_afu|adapter(), the device
is not added, device_unregister() can not be called in the error path,
otherwise it will cause a null-ptr-deref because of removing not added
device.

As comment of device_register() says, it should use put_device() to give
up the reference in the error path. So split device_unregister() into
device_del() and put_device(), then goes to put dev when register fails.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < 96fba6fb95bdede80583c262ac185da09661f264
Version 14baf4d9c739e6e69150512d2eb23c71fffcc192
Status affected
Version < 1ae581696b7a799afa39a664c4b721569643f58a
Version 14baf4d9c739e6e69150512d2eb23c71fffcc192
Status affected
Version < d775a1da5a52b4f4bb02f2707ba420d1bec48dbb
Version 14baf4d9c739e6e69150512d2eb23c71fffcc192
Status affected
Version < 60b2ed21a65f3f5318666ccd765c3507991370cf
Version 14baf4d9c739e6e69150512d2eb23c71fffcc192
Status affected
Version < 170e8c2d2b61e15e7f7cfeded81bc1e959a15ed8
Version 14baf4d9c739e6e69150512d2eb23c71fffcc192
Status affected
Version < e5021bbf11b024cc65ea1e84c377df484183be4b
Version 14baf4d9c739e6e69150512d2eb23c71fffcc192
Status affected
Version < b32559ee4e6667c5c3daf4ec5454c277d1f255d2
Version 14baf4d9c739e6e69150512d2eb23c71fffcc192
Status affected
Version < ab44c182353be101c3be9465e1d15d42130c53c4
Version 14baf4d9c739e6e69150512d2eb23c71fffcc192
Status affected
Version < 61c80d1c3833e196256fb060382db94f24d3d9a7
Version 14baf4d9c739e6e69150512d2eb23c71fffcc192
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 4.6
Status affected
Version < 4.6
Version 0
Status unaffected
Version <= 4.9.*
Version 4.9.337
Status unaffected
Version <= 4.14.*
Version 4.14.303
Status unaffected
Version <= 4.19.*
Version 4.19.270
Status unaffected
Version <= 5.4.*
Version 5.4.229
Status unaffected
Version <= 5.10.*
Version 5.10.163
Status unaffected
Version <= 5.15.*
Version 5.15.86
Status unaffected
Version <= 6.0.*
Version 6.0.16
Status unaffected
Version <= 6.1.*
Version 6.1.2
Status unaffected
Version <= *
Version 6.2
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.03% 0.084
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string