-

CVE-2022-50525

In the Linux kernel, the following vulnerability has been resolved:

iommu/fsl_pamu: Fix resource leak in fsl_pamu_probe()

The fsl_pamu_probe() returns directly when create_csd() failed, leaving
irq and memories unreleased.
Fix by jumping to error if create_csd() returns error.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < c93983230562883e0b5f122040efbb3d478c36d4
Version 695093e38c3ef63fcb43a2840ed865efa20671d5
Status affected
Version < a305d0e4d0ce3166e31d7dbcb4c98b09cad6d49a
Version 695093e38c3ef63fcb43a2840ed865efa20671d5
Status affected
Version < 9fbccdf2fefa3944dd8ba8c6a808b387787f3917
Version 695093e38c3ef63fcb43a2840ed865efa20671d5
Status affected
Version < 17fd440594961c5e2ea0f58591bc1bdba0629c75
Version 695093e38c3ef63fcb43a2840ed865efa20671d5
Status affected
Version < 0d240ac0e4c35d3f64fc782c11433138c1bd016e
Version 695093e38c3ef63fcb43a2840ed865efa20671d5
Status affected
Version < e42b543d08052c3b223bcfb48f05cbaf0b767f86
Version 695093e38c3ef63fcb43a2840ed865efa20671d5
Status affected
Version < 9238b687fd62cde14c6e2e8576a40e4246de7ebe
Version 695093e38c3ef63fcb43a2840ed865efa20671d5
Status affected
Version < de7eb55009796687fc0a1670e0b944fa8ed54e9b
Version 695093e38c3ef63fcb43a2840ed865efa20671d5
Status affected
Version < 73f5fc5f884ad0c5f7d57f66303af64f9f002526
Version 695093e38c3ef63fcb43a2840ed865efa20671d5
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 3.12
Status affected
Version < 3.12
Version 0
Status unaffected
Version <= 4.9.*
Version 4.9.337
Status unaffected
Version <= 4.14.*
Version 4.14.303
Status unaffected
Version <= 4.19.*
Version 4.19.270
Status unaffected
Version <= 5.4.*
Version 5.4.229
Status unaffected
Version <= 5.10.*
Version 5.10.163
Status unaffected
Version <= 5.15.*
Version 5.15.86
Status unaffected
Version <= 6.0.*
Version 6.0.16
Status unaffected
Version <= 6.1.*
Version 6.1.2
Status unaffected
Version <= *
Version 6.2
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string