-
CVE-2022-50645
- EPSS 0.02%
- Veröffentlicht 09.12.2025 00:00:19
- Zuletzt bearbeitet 09.12.2025 18:37:13
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
In the Linux kernel, the following vulnerability has been resolved: EDAC/i10nm: fix refcount leak in pci_get_dev_wrapper() As the comment of pci_get_domain_bus_and_slot() says, it returns a PCI device with refcount incremented, so it doesn't need to call an extra pci_dev_get() in pci_get_dev_wrapper(), and the PCI device needs to be put in the error path.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
e6e295a434d1c917a017980389aec88bf35cc81b
Version
d4dc89d069aab9074e2493a4c2f3969a0a0b91c1
Status
affected
Version <
2db53c7059167b63cc790366ef1a9e286e71980b
Version
d4dc89d069aab9074e2493a4c2f3969a0a0b91c1
Status
affected
Version <
3e255dc21031cc1f341584eb99a7f31598bf0be7
Version
d4dc89d069aab9074e2493a4c2f3969a0a0b91c1
Status
affected
Version <
1adb2583cdbd75f379e3230a43a7412d373d499f
Version
d4dc89d069aab9074e2493a4c2f3969a0a0b91c1
Status
affected
Version <
f29c2f57cdf7a57223dcd9fbaa2261faab5234b2
Version
d4dc89d069aab9074e2493a4c2f3969a0a0b91c1
Status
affected
Version <
9c8921555907f4d723f01ed2d859b66f2d14f08e
Version
d4dc89d069aab9074e2493a4c2f3969a0a0b91c1
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
5.1
Status
affected
Version <
5.1
Version
0
Status
unaffected
Version <=
5.4.*
Version
5.4.229
Status
unaffected
Version <=
5.10.*
Version
5.10.163
Status
unaffected
Version <=
5.15.*
Version
5.15.86
Status
unaffected
Version <=
6.0.*
Version
6.0.16
Status
unaffected
Version <=
6.1.*
Version
6.1.2
Status
unaffected
Version <=
*
Version
6.2
Status
unaffected
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.02% | 0.058 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|