-
CVE-2022-50734
- EPSS 0.03%
- Veröffentlicht 24.12.2025 12:22:53
- Zuletzt bearbeitet 29.12.2025 15:58:34
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
In the Linux kernel, the following vulnerability has been resolved: nvmem: core: Fix memleak in nvmem_register() dev_set_name will alloc memory for nvmem->dev.kobj.name in nvmem_register, when nvmem_validate_keepouts failed, nvmem's memory will be freed and return, but nobody will free memory for nvmem->dev.kobj.name, there will be memleak, so moving nvmem_validate_keepouts() after device_register() and let the device core deal with cleaning name in error cases.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
9391cc3a787a58aa224a6440d7f244d780ba2896
Version
de0534df93474f268486c486ea7e01b44a478026
Status
affected
Version <
2bd2774df0ce37920b23819a860a66fdbdd90823
Version
de0534df93474f268486c486ea7e01b44a478026
Status
affected
Version <
b6054b9b239a493672f853b034570cca93ba7a88
Version
de0534df93474f268486c486ea7e01b44a478026
Status
affected
Version <
bd1244561fa2a4531ded40dbf09c9599084f8b29
Version
de0534df93474f268486c486ea7e01b44a478026
Status
affected
Version
c1d44b93ca9f3ebc26b0de0a7f4b7156702762b6
Status
affected
Version
63c2b13ba0428b8f477e4adb1d40a50eb4493c09
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
5.15
Status
affected
Version <
5.15
Version
0
Status
unaffected
Version <=
5.15.*
Version
5.15.75
Status
unaffected
Version <=
5.19.*
Version
5.19.17
Status
unaffected
Version <=
6.0.*
Version
6.0.3
Status
unaffected
Version <=
*
Version
6.1
Status
unaffected
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.03% | 0.064 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|