-
CVE-2022-50522
- EPSS -
- Published 07.10.2025 15:19:15
- Last modified 07.10.2025 16:15:36
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- Teams watchlist Login
- Open Login
In the Linux kernel, the following vulnerability has been resolved: mcb: mcb-parse: fix error handing in chameleon_parse_gdd() If mcb_device_register() returns error in chameleon_parse_gdd(), the refcount of bus and device name are leaked. Fix this by calling put_device() to give up the reference, so they can be released in mcb_release_dev() and kobject_cleanup().
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
≫
Product
Linux
Default Statusunaffected
Version <
891f606ae0765bc9ca99f5276735be4d338f0255
Version
3764e82e5150d87b205c10cd78a9c9ab86fbfa51
Status
affected
Version <
cf6e70c0ced50b52415ac0c88eba1fb09c500a5a
Version
3764e82e5150d87b205c10cd78a9c9ab86fbfa51
Status
affected
Version <
fd85ece416fd7edb945203e59d4cd94952f77e7c
Version
3764e82e5150d87b205c10cd78a9c9ab86fbfa51
Status
affected
Version <
110dc34c9fa33d37f55b394b1199ea6c0ad1ee84
Version
3764e82e5150d87b205c10cd78a9c9ab86fbfa51
Status
affected
Version <
7b289b791a59386dc23a00d3cf17a0db984b40d3
Version
3764e82e5150d87b205c10cd78a9c9ab86fbfa51
Status
affected
Version <
43bfc7c2402a22d3b4eb08c040f274ba2b76461a
Version
3764e82e5150d87b205c10cd78a9c9ab86fbfa51
Status
affected
Version <
b948baa29394ec5f4e6ec28486e7d06a76caee91
Version
3764e82e5150d87b205c10cd78a9c9ab86fbfa51
Status
affected
Version <
4a9f1a8b3af287581ffb690d0e1593c681729ddb
Version
3764e82e5150d87b205c10cd78a9c9ab86fbfa51
Status
affected
Version <
728ac3389296caf68638628c987aeae6c8851e2d
Version
3764e82e5150d87b205c10cd78a9c9ab86fbfa51
Status
affected
VendorLinux
≫
Product
Linux
Default Statusaffected
Version
3.15
Status
affected
Version <
3.15
Version
0
Status
unaffected
Version <=
4.9.*
Version
4.9.337
Status
unaffected
Version <=
4.14.*
Version
4.14.303
Status
unaffected
Version <=
4.19.*
Version
4.19.270
Status
unaffected
Version <=
5.4.*
Version
5.4.229
Status
unaffected
Version <=
5.10.*
Version
5.10.163
Status
unaffected
Version <=
5.15.*
Version
5.15.86
Status
unaffected
Version <=
6.0.*
Version
6.0.16
Status
unaffected
Version <=
6.1.*
Version
6.1.2
Status
unaffected
Version <=
*
Version
6.2
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|