-
CVE-2022-50547
- EPSS -
- Veröffentlicht 07.10.2025 15:21:10
- Zuletzt bearbeitet 07.10.2025 16:15:39
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- Teams Watchlist Login
- Unerledigt Login
In the Linux kernel, the following vulnerability has been resolved: media: solo6x10: fix possible memory leak in solo_sysfs_init() If device_register() returns error in solo_sysfs_init(), the name allocated by dev_set_name() need be freed. As comment of device_register() says, it should use put_device() to give up the reference in the error path. So fix this by calling put_device(), then the name can be freed in kobject_cleanup().
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
83d4b1ae98a47a739fa5241300b86eb1110d5d63
Version
dcae5dacbce518513abf7776cb450b7bd95d722b
Status
affected
Version <
b61509093e1af69e336a094d439b8e1137cb40d8
Version
dcae5dacbce518513abf7776cb450b7bd95d722b
Status
affected
Version <
963729538674be4cb8fa292529ecf32de0d6c6dd
Version
dcae5dacbce518513abf7776cb450b7bd95d722b
Status
affected
Version <
7b02c50d3978840781808e13bc13137fb81286b5
Version
dcae5dacbce518513abf7776cb450b7bd95d722b
Status
affected
Version <
49060c0da57a381563e482e331dc9d4c3725b41b
Version
dcae5dacbce518513abf7776cb450b7bd95d722b
Status
affected
Version <
7cf71bbe5d2ee12613f6e278888f5fc9c5c0cc2b
Version
dcae5dacbce518513abf7776cb450b7bd95d722b
Status
affected
Version <
d6db105bcfbdbbbd484e788a0ddf8140a4a8c486
Version
dcae5dacbce518513abf7776cb450b7bd95d722b
Status
affected
Version <
9416861170ba0da8ddb0f4fd2d28334f0ed3b9c2
Version
dcae5dacbce518513abf7776cb450b7bd95d722b
Status
affected
Version <
7f5866dd96d95b74e439f6ee17b8abd8195179fb
Version
dcae5dacbce518513abf7776cb450b7bd95d722b
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
3.10
Status
affected
Version <
3.10
Version
0
Status
unaffected
Version <=
4.9.*
Version
4.9.337
Status
unaffected
Version <=
4.14.*
Version
4.14.303
Status
unaffected
Version <=
4.19.*
Version
4.19.270
Status
unaffected
Version <=
5.4.*
Version
5.4.229
Status
unaffected
Version <=
5.10.*
Version
5.10.163
Status
unaffected
Version <=
5.15.*
Version
5.15.86
Status
unaffected
Version <=
6.0.*
Version
6.0.16
Status
unaffected
Version <=
6.1.*
Version
6.1.2
Status
unaffected
Version <=
*
Version
6.2
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|