-
CVE-2022-50523
- EPSS -
- Veröffentlicht 07.10.2025 15:19:16
- Zuletzt bearbeitet 07.10.2025 16:15:36
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- Teams Watchlist Login
- Unerledigt Login
In the Linux kernel, the following vulnerability has been resolved: clk: rockchip: Fix memory leak in rockchip_clk_register_pll() If clk_register() fails, @pll->rate_table may have allocated memory by kmemdup(), so it needs to be freed, otherwise will cause memory leak issue, this patch fixes it.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
20201c3a0a32f127fa4bdf379d6ac01c2978702d
Version
90c590254051f511299538c158e12fdad41ce163
Status
affected
Version <
86e1e080ad14c5fb6c14a5f0eb530b1b38cbc968
Version
90c590254051f511299538c158e12fdad41ce163
Status
affected
Version <
f02c1d8dc8d880cbaaf9094b4f396fe868ee23ff
Version
90c590254051f511299538c158e12fdad41ce163
Status
affected
Version <
26b94635f1c84d7f6cb482179125cb17e59c90a5
Version
90c590254051f511299538c158e12fdad41ce163
Status
affected
Version <
f4d70c139d313948e02360304a6cbcd3a4f5deb5
Version
90c590254051f511299538c158e12fdad41ce163
Status
affected
Version <
5b0a1f1247cd42ac5e0d369f8dbb58762692edee
Version
90c590254051f511299538c158e12fdad41ce163
Status
affected
Version <
dcd4ba068b194c6ef0071491aa3f12bec8c14d5b
Version
90c590254051f511299538c158e12fdad41ce163
Status
affected
Version <
f2ffb8653ea85ae39ce44347751fcc4c3e41f6bb
Version
90c590254051f511299538c158e12fdad41ce163
Status
affected
Version <
739a6a6bbdb793bd57938cb24aa5a6df89983546
Version
90c590254051f511299538c158e12fdad41ce163
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
3.17
Status
affected
Version <
3.17
Version
0
Status
unaffected
Version <=
4.9.*
Version
4.9.337
Status
unaffected
Version <=
4.14.*
Version
4.14.303
Status
unaffected
Version <=
4.19.*
Version
4.19.270
Status
unaffected
Version <=
5.4.*
Version
5.4.229
Status
unaffected
Version <=
5.10.*
Version
5.10.163
Status
unaffected
Version <=
5.15.*
Version
5.15.86
Status
unaffected
Version <=
6.0.*
Version
6.0.16
Status
unaffected
Version <=
6.1.*
Version
6.1.2
Status
unaffected
Version <=
*
Version
6.2
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|