-

CVE-2022-50547

In the Linux kernel, the following vulnerability has been resolved:

media: solo6x10: fix possible memory leak in solo_sysfs_init()

If device_register() returns error in solo_sysfs_init(), the
name allocated by dev_set_name() need be freed. As comment of
device_register() says, it should use put_device() to give up
the reference in the error path. So fix this by calling
put_device(), then the name can be freed in kobject_cleanup().

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < 83d4b1ae98a47a739fa5241300b86eb1110d5d63
Version dcae5dacbce518513abf7776cb450b7bd95d722b
Status affected
Version < b61509093e1af69e336a094d439b8e1137cb40d8
Version dcae5dacbce518513abf7776cb450b7bd95d722b
Status affected
Version < 963729538674be4cb8fa292529ecf32de0d6c6dd
Version dcae5dacbce518513abf7776cb450b7bd95d722b
Status affected
Version < 7b02c50d3978840781808e13bc13137fb81286b5
Version dcae5dacbce518513abf7776cb450b7bd95d722b
Status affected
Version < 49060c0da57a381563e482e331dc9d4c3725b41b
Version dcae5dacbce518513abf7776cb450b7bd95d722b
Status affected
Version < 7cf71bbe5d2ee12613f6e278888f5fc9c5c0cc2b
Version dcae5dacbce518513abf7776cb450b7bd95d722b
Status affected
Version < d6db105bcfbdbbbd484e788a0ddf8140a4a8c486
Version dcae5dacbce518513abf7776cb450b7bd95d722b
Status affected
Version < 9416861170ba0da8ddb0f4fd2d28334f0ed3b9c2
Version dcae5dacbce518513abf7776cb450b7bd95d722b
Status affected
Version < 7f5866dd96d95b74e439f6ee17b8abd8195179fb
Version dcae5dacbce518513abf7776cb450b7bd95d722b
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 3.10
Status affected
Version < 3.10
Version 0
Status unaffected
Version <= 4.9.*
Version 4.9.337
Status unaffected
Version <= 4.14.*
Version 4.14.303
Status unaffected
Version <= 4.19.*
Version 4.19.270
Status unaffected
Version <= 5.4.*
Version 5.4.229
Status unaffected
Version <= 5.10.*
Version 5.10.163
Status unaffected
Version <= 5.15.*
Version 5.15.86
Status unaffected
Version <= 6.0.*
Version 6.0.16
Status unaffected
Version <= 6.1.*
Version 6.1.2
Status unaffected
Version <= *
Version 6.2
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String