-
CVE-2022-50525
- EPSS -
- Veröffentlicht 07.10.2025 15:19:17
- Zuletzt bearbeitet 07.10.2025 16:15:36
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- Teams Watchlist Login
- Unerledigt Login
In the Linux kernel, the following vulnerability has been resolved: iommu/fsl_pamu: Fix resource leak in fsl_pamu_probe() The fsl_pamu_probe() returns directly when create_csd() failed, leaving irq and memories unreleased. Fix by jumping to error if create_csd() returns error.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
c93983230562883e0b5f122040efbb3d478c36d4
Version
695093e38c3ef63fcb43a2840ed865efa20671d5
Status
affected
Version <
a305d0e4d0ce3166e31d7dbcb4c98b09cad6d49a
Version
695093e38c3ef63fcb43a2840ed865efa20671d5
Status
affected
Version <
9fbccdf2fefa3944dd8ba8c6a808b387787f3917
Version
695093e38c3ef63fcb43a2840ed865efa20671d5
Status
affected
Version <
17fd440594961c5e2ea0f58591bc1bdba0629c75
Version
695093e38c3ef63fcb43a2840ed865efa20671d5
Status
affected
Version <
0d240ac0e4c35d3f64fc782c11433138c1bd016e
Version
695093e38c3ef63fcb43a2840ed865efa20671d5
Status
affected
Version <
e42b543d08052c3b223bcfb48f05cbaf0b767f86
Version
695093e38c3ef63fcb43a2840ed865efa20671d5
Status
affected
Version <
9238b687fd62cde14c6e2e8576a40e4246de7ebe
Version
695093e38c3ef63fcb43a2840ed865efa20671d5
Status
affected
Version <
de7eb55009796687fc0a1670e0b944fa8ed54e9b
Version
695093e38c3ef63fcb43a2840ed865efa20671d5
Status
affected
Version <
73f5fc5f884ad0c5f7d57f66303af64f9f002526
Version
695093e38c3ef63fcb43a2840ed865efa20671d5
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
3.12
Status
affected
Version <
3.12
Version
0
Status
unaffected
Version <=
4.9.*
Version
4.9.337
Status
unaffected
Version <=
4.14.*
Version
4.14.303
Status
unaffected
Version <=
4.19.*
Version
4.19.270
Status
unaffected
Version <=
5.4.*
Version
5.4.229
Status
unaffected
Version <=
5.10.*
Version
5.10.163
Status
unaffected
Version <=
5.15.*
Version
5.15.86
Status
unaffected
Version <=
6.0.*
Version
6.0.16
Status
unaffected
Version <=
6.1.*
Version
6.1.2
Status
unaffected
Version <=
*
Version
6.2
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|