-
CVE-2022-50566
- EPSS 0.06%
- Veröffentlicht 22.10.2025 13:23:23
- Zuletzt bearbeitet 22.10.2025 21:12:48
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
In the Linux kernel, the following vulnerability has been resolved:
mtd: Fix device name leak when register device failed in add_mtd_device()
There is a kmemleak when register device failed:
unreferenced object 0xffff888101aab550 (size 8):
comm "insmod", pid 3922, jiffies 4295277753 (age 925.408s)
hex dump (first 8 bytes):
6d 74 64 30 00 88 ff ff mtd0....
backtrace:
[<00000000bde26724>] __kmalloc_node_track_caller+0x4e/0x150
[<000000003c32b416>] kvasprintf+0xb0/0x130
[<000000001f7a8f15>] kobject_set_name_vargs+0x2f/0xb0
[<000000006e781163>] dev_set_name+0xab/0xe0
[<00000000e30d0c78>] add_mtd_device+0x4bb/0x700
[<00000000f3d34de7>] mtd_device_parse_register+0x2ac/0x3f0
[<00000000c0d88488>] 0xffffffffa0238457
[<00000000b40d0922>] 0xffffffffa02a008f
[<0000000023d17b9d>] do_one_initcall+0x87/0x2a0
[<00000000770f6ca6>] do_init_module+0xdf/0x320
[<000000007b6768fe>] load_module+0x2f98/0x3330
[<00000000346bed5a>] __do_sys_finit_module+0x113/0x1b0
[<00000000674c2290>] do_syscall_64+0x35/0x80
[<000000004c6a8d97>] entry_SYSCALL_64_after_hwframe+0x46/0xb0
If register device failed, should call put_device() to give up the
reference.Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
a75f45afa932bfb24a2603ebcea5efd2e7cdcfd6
Version
1f24b5a8ecbb2a3c7080f418974d40e3ffedb221
Status
affected
Version <
2302e2dc42b1f84f951c725ce742fc21c5a1e151
Version
1f24b5a8ecbb2a3c7080f418974d40e3ffedb221
Status
affected
Version <
db07fe76df01f40cb897d6e9066b84e46957beb3
Version
1f24b5a8ecbb2a3c7080f418974d40e3ffedb221
Status
affected
Version <
fa0d32ab8407d7481450c664fd0de64f2dae9489
Version
1f24b5a8ecbb2a3c7080f418974d40e3ffedb221
Status
affected
Version <
330bc5533e8a8ed69cb951d5a8edce9bddb9db21
Version
1f24b5a8ecbb2a3c7080f418974d40e3ffedb221
Status
affected
Version <
71212d73184845c944ef1b43f092e643e5bde003
Version
1f24b5a8ecbb2a3c7080f418974d40e3ffedb221
Status
affected
Version <
1b172fb05d6315ecec082fd7544a3390e96f0d7e
Version
1f24b5a8ecbb2a3c7080f418974d40e3ffedb221
Status
affected
Version <
bcabe1dc2a344adbb3382930a23e273ba9382277
Version
1f24b5a8ecbb2a3c7080f418974d40e3ffedb221
Status
affected
Version <
895d68a39481a75c680aa421546931fb11942fa6
Version
1f24b5a8ecbb2a3c7080f418974d40e3ffedb221
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
2.6.30
Status
affected
Version <
2.6.30
Version
0
Status
unaffected
Version <=
4.9.*
Version
4.9.337
Status
unaffected
Version <=
4.14.*
Version
4.14.303
Status
unaffected
Version <=
4.19.*
Version
4.19.270
Status
unaffected
Version <=
5.4.*
Version
5.4.229
Status
unaffected
Version <=
5.10.*
Version
5.10.163
Status
unaffected
Version <=
5.15.*
Version
5.15.86
Status
unaffected
Version <=
6.0.*
Version
6.0.16
Status
unaffected
Version <=
6.1.*
Version
6.1.2
Status
unaffected
Version <=
*
Version
6.2
Status
unaffected
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.06% | 0.195 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|