-
CVE-2022-50522
- EPSS -
- Veröffentlicht 07.10.2025 15:19:15
- Zuletzt bearbeitet 07.10.2025 16:15:36
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- Teams Watchlist Login
- Unerledigt Login
In the Linux kernel, the following vulnerability has been resolved: mcb: mcb-parse: fix error handing in chameleon_parse_gdd() If mcb_device_register() returns error in chameleon_parse_gdd(), the refcount of bus and device name are leaked. Fix this by calling put_device() to give up the reference, so they can be released in mcb_release_dev() and kobject_cleanup().
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
891f606ae0765bc9ca99f5276735be4d338f0255
Version
3764e82e5150d87b205c10cd78a9c9ab86fbfa51
Status
affected
Version <
cf6e70c0ced50b52415ac0c88eba1fb09c500a5a
Version
3764e82e5150d87b205c10cd78a9c9ab86fbfa51
Status
affected
Version <
fd85ece416fd7edb945203e59d4cd94952f77e7c
Version
3764e82e5150d87b205c10cd78a9c9ab86fbfa51
Status
affected
Version <
110dc34c9fa33d37f55b394b1199ea6c0ad1ee84
Version
3764e82e5150d87b205c10cd78a9c9ab86fbfa51
Status
affected
Version <
7b289b791a59386dc23a00d3cf17a0db984b40d3
Version
3764e82e5150d87b205c10cd78a9c9ab86fbfa51
Status
affected
Version <
43bfc7c2402a22d3b4eb08c040f274ba2b76461a
Version
3764e82e5150d87b205c10cd78a9c9ab86fbfa51
Status
affected
Version <
b948baa29394ec5f4e6ec28486e7d06a76caee91
Version
3764e82e5150d87b205c10cd78a9c9ab86fbfa51
Status
affected
Version <
4a9f1a8b3af287581ffb690d0e1593c681729ddb
Version
3764e82e5150d87b205c10cd78a9c9ab86fbfa51
Status
affected
Version <
728ac3389296caf68638628c987aeae6c8851e2d
Version
3764e82e5150d87b205c10cd78a9c9ab86fbfa51
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
3.15
Status
affected
Version <
3.15
Version
0
Status
unaffected
Version <=
4.9.*
Version
4.9.337
Status
unaffected
Version <=
4.14.*
Version
4.14.303
Status
unaffected
Version <=
4.19.*
Version
4.19.270
Status
unaffected
Version <=
5.4.*
Version
5.4.229
Status
unaffected
Version <=
5.10.*
Version
5.10.163
Status
unaffected
Version <=
5.15.*
Version
5.15.86
Status
unaffected
Version <=
6.0.*
Version
6.0.16
Status
unaffected
Version <=
6.1.*
Version
6.1.2
Status
unaffected
Version <=
*
Version
6.2
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|