-

CVE-2022-50523

In the Linux kernel, the following vulnerability has been resolved:

clk: rockchip: Fix memory leak in rockchip_clk_register_pll()

If clk_register() fails, @pll->rate_table may have allocated memory by
kmemdup(), so it needs to be freed, otherwise will cause memory leak
issue, this patch fixes it.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < 20201c3a0a32f127fa4bdf379d6ac01c2978702d
Version 90c590254051f511299538c158e12fdad41ce163
Status affected
Version < 86e1e080ad14c5fb6c14a5f0eb530b1b38cbc968
Version 90c590254051f511299538c158e12fdad41ce163
Status affected
Version < f02c1d8dc8d880cbaaf9094b4f396fe868ee23ff
Version 90c590254051f511299538c158e12fdad41ce163
Status affected
Version < 26b94635f1c84d7f6cb482179125cb17e59c90a5
Version 90c590254051f511299538c158e12fdad41ce163
Status affected
Version < f4d70c139d313948e02360304a6cbcd3a4f5deb5
Version 90c590254051f511299538c158e12fdad41ce163
Status affected
Version < 5b0a1f1247cd42ac5e0d369f8dbb58762692edee
Version 90c590254051f511299538c158e12fdad41ce163
Status affected
Version < dcd4ba068b194c6ef0071491aa3f12bec8c14d5b
Version 90c590254051f511299538c158e12fdad41ce163
Status affected
Version < f2ffb8653ea85ae39ce44347751fcc4c3e41f6bb
Version 90c590254051f511299538c158e12fdad41ce163
Status affected
Version < 739a6a6bbdb793bd57938cb24aa5a6df89983546
Version 90c590254051f511299538c158e12fdad41ce163
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 3.17
Status affected
Version < 3.17
Version 0
Status unaffected
Version <= 4.9.*
Version 4.9.337
Status unaffected
Version <= 4.14.*
Version 4.14.303
Status unaffected
Version <= 4.19.*
Version 4.19.270
Status unaffected
Version <= 5.4.*
Version 5.4.229
Status unaffected
Version <= 5.10.*
Version 5.10.163
Status unaffected
Version <= 5.15.*
Version 5.15.86
Status unaffected
Version <= 6.0.*
Version 6.0.16
Status unaffected
Version <= 6.1.*
Version 6.1.2
Status unaffected
Version <= *
Version 6.2
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String