-

CVE-2022-50672

In the Linux kernel, the following vulnerability has been resolved:

mailbox: zynq-ipi: fix error handling while device_register() fails

If device_register() fails, it has two issues:
1. The name allocated by dev_set_name() is leaked.
2. The parent of device is not NULL, device_unregister() is called
   in zynqmp_ipi_free_mboxes(), it will lead a kernel crash because
   of removing not added device.

Call put_device() to give up the reference, so the name is freed in
kobject_cleanup(). Add device registered check in zynqmp_ipi_free_mboxes()
to avoid null-ptr-deref.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < b3a5c76f61e2b380e29dfc6705854ca1ee85501d
Version 4981b82ba2ff87df6a711fcd7a233c615df5fc79
Status affected
Version < a39b4de0804f9fe0ae911b359ffd4afe7d9d933b
Version 4981b82ba2ff87df6a711fcd7a233c615df5fc79
Status affected
Version < 4f05d8e2fb3ab702c2633a74571e1b31cb579985
Version 4981b82ba2ff87df6a711fcd7a233c615df5fc79
Status affected
Version < f2d63cefc012cafe1b7651bbf3302f8bcd8bea4a
Version 4981b82ba2ff87df6a711fcd7a233c615df5fc79
Status affected
Version < 3fcf079958c00d83c51e4f250abf2c77fe9cc1b9
Version 4981b82ba2ff87df6a711fcd7a233c615df5fc79
Status affected
Version < a6792a0cdef0b1c2d77920246283a72537e60e94
Version 4981b82ba2ff87df6a711fcd7a233c615df5fc79
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 5.1
Status affected
Version < 5.1
Version 0
Status unaffected
Version <= 5.4.*
Version 5.4.229
Status unaffected
Version <= 5.10.*
Version 5.10.163
Status unaffected
Version <= 5.15.*
Version 5.15.86
Status unaffected
Version <= 6.0.*
Version 6.0.16
Status unaffected
Version <= 6.1.*
Version 6.1.2
Status unaffected
Version <= *
Version 6.2
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.02% 0.058
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String