-

CVE-2022-50645

In the Linux kernel, the following vulnerability has been resolved:

EDAC/i10nm: fix refcount leak in pci_get_dev_wrapper()

As the comment of pci_get_domain_bus_and_slot() says, it returns
a PCI device with refcount incremented, so it doesn't need to
call an extra pci_dev_get() in pci_get_dev_wrapper(), and the PCI
device needs to be put in the error path.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < e6e295a434d1c917a017980389aec88bf35cc81b
Version d4dc89d069aab9074e2493a4c2f3969a0a0b91c1
Status affected
Version < 2db53c7059167b63cc790366ef1a9e286e71980b
Version d4dc89d069aab9074e2493a4c2f3969a0a0b91c1
Status affected
Version < 3e255dc21031cc1f341584eb99a7f31598bf0be7
Version d4dc89d069aab9074e2493a4c2f3969a0a0b91c1
Status affected
Version < 1adb2583cdbd75f379e3230a43a7412d373d499f
Version d4dc89d069aab9074e2493a4c2f3969a0a0b91c1
Status affected
Version < f29c2f57cdf7a57223dcd9fbaa2261faab5234b2
Version d4dc89d069aab9074e2493a4c2f3969a0a0b91c1
Status affected
Version < 9c8921555907f4d723f01ed2d859b66f2d14f08e
Version d4dc89d069aab9074e2493a4c2f3969a0a0b91c1
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 5.1
Status affected
Version < 5.1
Version 0
Status unaffected
Version <= 5.4.*
Version 5.4.229
Status unaffected
Version <= 5.10.*
Version 5.10.163
Status unaffected
Version <= 5.15.*
Version 5.15.86
Status unaffected
Version <= 6.0.*
Version 6.0.16
Status unaffected
Version <= 6.1.*
Version 6.1.2
Status unaffected
Version <= *
Version 6.2
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.02% 0.058
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String