-
CVE-2022-50525
- EPSS -
- Published 07.10.2025 15:19:17
- Last modified 07.10.2025 16:15:36
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- Teams watchlist Login
- Open Login
In the Linux kernel, the following vulnerability has been resolved: iommu/fsl_pamu: Fix resource leak in fsl_pamu_probe() The fsl_pamu_probe() returns directly when create_csd() failed, leaving irq and memories unreleased. Fix by jumping to error if create_csd() returns error.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
≫
Product
Linux
Default Statusunaffected
Version <
c93983230562883e0b5f122040efbb3d478c36d4
Version
695093e38c3ef63fcb43a2840ed865efa20671d5
Status
affected
Version <
a305d0e4d0ce3166e31d7dbcb4c98b09cad6d49a
Version
695093e38c3ef63fcb43a2840ed865efa20671d5
Status
affected
Version <
9fbccdf2fefa3944dd8ba8c6a808b387787f3917
Version
695093e38c3ef63fcb43a2840ed865efa20671d5
Status
affected
Version <
17fd440594961c5e2ea0f58591bc1bdba0629c75
Version
695093e38c3ef63fcb43a2840ed865efa20671d5
Status
affected
Version <
0d240ac0e4c35d3f64fc782c11433138c1bd016e
Version
695093e38c3ef63fcb43a2840ed865efa20671d5
Status
affected
Version <
e42b543d08052c3b223bcfb48f05cbaf0b767f86
Version
695093e38c3ef63fcb43a2840ed865efa20671d5
Status
affected
Version <
9238b687fd62cde14c6e2e8576a40e4246de7ebe
Version
695093e38c3ef63fcb43a2840ed865efa20671d5
Status
affected
Version <
de7eb55009796687fc0a1670e0b944fa8ed54e9b
Version
695093e38c3ef63fcb43a2840ed865efa20671d5
Status
affected
Version <
73f5fc5f884ad0c5f7d57f66303af64f9f002526
Version
695093e38c3ef63fcb43a2840ed865efa20671d5
Status
affected
VendorLinux
≫
Product
Linux
Default Statusaffected
Version
3.12
Status
affected
Version <
3.12
Version
0
Status
unaffected
Version <=
4.9.*
Version
4.9.337
Status
unaffected
Version <=
4.14.*
Version
4.14.303
Status
unaffected
Version <=
4.19.*
Version
4.19.270
Status
unaffected
Version <=
5.4.*
Version
5.4.229
Status
unaffected
Version <=
5.10.*
Version
5.10.163
Status
unaffected
Version <=
5.15.*
Version
5.15.86
Status
unaffected
Version <=
6.0.*
Version
6.0.16
Status
unaffected
Version <=
6.1.*
Version
6.1.2
Status
unaffected
Version <=
*
Version
6.2
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|