-
CVE-2022-50537
- EPSS -
- Published 07.10.2025 15:21:03
- Last modified 07.10.2025 16:15:37
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- Teams watchlist Login
- Open Login
In the Linux kernel, the following vulnerability has been resolved: firmware: raspberrypi: fix possible memory leak in rpi_firmware_probe() In rpi_firmware_probe(), if mbox_request_channel() fails, the 'fw' will not be freed through rpi_firmware_delete(), fix this leak by calling kfree() in the error path.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
≫
Product
Linux
Default Statusunaffected
Version <
62ac943eb2a9d655e431b9bc98ff6d7bd51a0e49
Version
d537afa08e156a0a72562e625506825c2776fcfa
Status
affected
Version <
d34742245e4366579f9a80f8cfe4a63248e838e0
Version
60831f5ae6c713afceb6d29f40899ed112f36059
Status
affected
Version <
b308fdedef095aac14569f810d46edf773ea7d1e
Version
1e7c57355a3bc617fc220234889e49fe722a6305
Status
affected
Version <
6757dd2193fe18c5c5fe3050e7f2ff9dcbd1ff34
Version
1e7c57355a3bc617fc220234889e49fe722a6305
Status
affected
Version <
71d2abab374f707ab8ac8dcef191fd2b3b67b8bd
Version
1e7c57355a3bc617fc220234889e49fe722a6305
Status
affected
Version <
7b51161696e803fd5f9ad55b20a64c2df313f95c
Version
1e7c57355a3bc617fc220234889e49fe722a6305
Status
affected
VendorLinux
≫
Product
Linux
Default Statusaffected
Version
5.13
Status
affected
Version <
5.13
Version
0
Status
unaffected
Version <=
5.10.*
Version
5.10.163
Status
unaffected
Version <=
5.15.*
Version
5.15.86
Status
unaffected
Version <=
6.0.*
Version
6.0.16
Status
unaffected
Version <=
6.1.*
Version
6.1.2
Status
unaffected
Version <=
*
Version
6.2
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|