-
CVE-2022-50499
- EPSS 0.03%
- Published 04.10.2025 15:43:50
- Last modified 06.10.2025 14:56:21
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- Teams watchlist Login
- Open Login
In the Linux kernel, the following vulnerability has been resolved: media: dvb-core: Fix double free in dvb_register_device() In function dvb_register_device() -> dvb_register_media_device() -> dvb_create_media_entity(), dvb->entity is allocated and initialized. If the initialization fails, it frees the dvb->entity, and return an error code. The caller takes the error code and handles the error by calling dvb_media_device_free(), which unregisters the entity and frees the field again if it is not NULL. As dvb->entity may not NULLed in dvb_create_media_entity() when the allocation of dvbdev->pad fails, a double free may occur. This may also cause an Use After free in media_device_unregister_entity(). Fix this by storing NULL to dvb->entity when it is freed.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
≫
Product
Linux
Default Statusunaffected
Version <
0588b12c418c3e4f927ced11f27b02ef4a5bfb07
Version
9db28659aa893c68f162b11fd63bb7f6a713e52f
Status
affected
Version <
e9a78485b658361fab6a5547377be6c1af6f1b3d
Version
1399a136127bfe1b9bb7c951d9851da62a519121
Status
affected
Version <
70bc51303871159796b55ba1a8f16637b46c2511
Version
4df2427a5148093987437054bb82da4d014dcd59
Status
affected
Version <
b21f62b49ee9c3e0216d685d9cfd6003e5727271
Version
fcd5ce4b3936242e6679875a4d3c3acfc8743e15
Status
affected
Version <
7dd5a68cdbbbe7fc67ba701cb52ba10d8ba149f8
Version
fcd5ce4b3936242e6679875a4d3c3acfc8743e15
Status
affected
Version <
acf984a3718c2458eb9e08b6714490a04f213c58
Version
fcd5ce4b3936242e6679875a4d3c3acfc8743e15
Status
affected
Version <
772892b29ac50c2c5e918fc80104aa6ede81d837
Version
fcd5ce4b3936242e6679875a4d3c3acfc8743e15
Status
affected
Version <
123eddf92a114e03919942641d2c2b1f4ca56ea6
Version
fcd5ce4b3936242e6679875a4d3c3acfc8743e15
Status
affected
Version <
6b0d0477fce747d4137aa65856318b55fba72198
Version
fcd5ce4b3936242e6679875a4d3c3acfc8743e15
Status
affected
Version
8c17f6f5d0d6aab72a2af25c9911ac66e984be06
Status
affected
Version
202be5d6e46f682b9d1d79cd4dc6ab726e62ef1c
Status
affected
VendorLinux
≫
Product
Linux
Default Statusaffected
Version
5.4
Status
affected
Version <
5.4
Version
0
Status
unaffected
Version <=
4.9.*
Version
4.9.337
Status
unaffected
Version <=
4.14.*
Version
4.14.303
Status
unaffected
Version <=
4.19.*
Version
4.19.270
Status
unaffected
Version <=
5.4.*
Version
5.4.229
Status
unaffected
Version <=
5.10.*
Version
5.10.163
Status
unaffected
Version <=
5.15.*
Version
5.15.87
Status
unaffected
Version <=
6.0.*
Version
6.0.18
Status
unaffected
Version <=
6.1.*
Version
6.1.4
Status
unaffected
Version <=
*
Version
6.2
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.03% | 0.084 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|