-

CVE-2022-50522

In the Linux kernel, the following vulnerability has been resolved:

mcb: mcb-parse: fix error handing in chameleon_parse_gdd()

If mcb_device_register() returns error in chameleon_parse_gdd(), the refcount
of bus and device name are leaked. Fix this by calling put_device() to give up
the reference, so they can be released in mcb_release_dev() and kobject_cleanup().

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < 891f606ae0765bc9ca99f5276735be4d338f0255
Version 3764e82e5150d87b205c10cd78a9c9ab86fbfa51
Status affected
Version < cf6e70c0ced50b52415ac0c88eba1fb09c500a5a
Version 3764e82e5150d87b205c10cd78a9c9ab86fbfa51
Status affected
Version < fd85ece416fd7edb945203e59d4cd94952f77e7c
Version 3764e82e5150d87b205c10cd78a9c9ab86fbfa51
Status affected
Version < 110dc34c9fa33d37f55b394b1199ea6c0ad1ee84
Version 3764e82e5150d87b205c10cd78a9c9ab86fbfa51
Status affected
Version < 7b289b791a59386dc23a00d3cf17a0db984b40d3
Version 3764e82e5150d87b205c10cd78a9c9ab86fbfa51
Status affected
Version < 43bfc7c2402a22d3b4eb08c040f274ba2b76461a
Version 3764e82e5150d87b205c10cd78a9c9ab86fbfa51
Status affected
Version < b948baa29394ec5f4e6ec28486e7d06a76caee91
Version 3764e82e5150d87b205c10cd78a9c9ab86fbfa51
Status affected
Version < 4a9f1a8b3af287581ffb690d0e1593c681729ddb
Version 3764e82e5150d87b205c10cd78a9c9ab86fbfa51
Status affected
Version < 728ac3389296caf68638628c987aeae6c8851e2d
Version 3764e82e5150d87b205c10cd78a9c9ab86fbfa51
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 3.15
Status affected
Version < 3.15
Version 0
Status unaffected
Version <= 4.9.*
Version 4.9.337
Status unaffected
Version <= 4.14.*
Version 4.14.303
Status unaffected
Version <= 4.19.*
Version 4.19.270
Status unaffected
Version <= 5.4.*
Version 5.4.229
Status unaffected
Version <= 5.10.*
Version 5.10.163
Status unaffected
Version <= 5.15.*
Version 5.15.86
Status unaffected
Version <= 6.0.*
Version 6.0.16
Status unaffected
Version <= 6.1.*
Version 6.1.2
Status unaffected
Version <= *
Version 6.2
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String