-

CVE-2022-50734

In the Linux kernel, the following vulnerability has been resolved:

nvmem: core: Fix memleak in nvmem_register()

dev_set_name will alloc memory for nvmem->dev.kobj.name in
nvmem_register, when nvmem_validate_keepouts failed, nvmem's
memory will be freed and return, but nobody will free memory
for nvmem->dev.kobj.name, there will be memleak, so moving
nvmem_validate_keepouts() after device_register() and let
the device core deal with cleaning name in error cases.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < 9391cc3a787a58aa224a6440d7f244d780ba2896
Version de0534df93474f268486c486ea7e01b44a478026
Status affected
Version < 2bd2774df0ce37920b23819a860a66fdbdd90823
Version de0534df93474f268486c486ea7e01b44a478026
Status affected
Version < b6054b9b239a493672f853b034570cca93ba7a88
Version de0534df93474f268486c486ea7e01b44a478026
Status affected
Version < bd1244561fa2a4531ded40dbf09c9599084f8b29
Version de0534df93474f268486c486ea7e01b44a478026
Status affected
Version c1d44b93ca9f3ebc26b0de0a7f4b7156702762b6
Status affected
Version 63c2b13ba0428b8f477e4adb1d40a50eb4493c09
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 5.15
Status affected
Version < 5.15
Version 0
Status unaffected
Version <= 5.15.*
Version 5.15.75
Status unaffected
Version <= 5.19.*
Version 5.19.17
Status unaffected
Version <= 6.0.*
Version 6.0.3
Status unaffected
Version <= *
Version 6.1
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.03% 0.064
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
Es wurden noch keine Informationen zu CWE veröffentlicht.