-

CVE-2022-50848

In the Linux kernel, the following vulnerability has been resolved:

drivers: dio: fix possible memory leak in dio_init()

If device_register() returns error, the 'dev' and name needs be
freed. Add a release function, and then call put_device() in the
error path, so the name is freed in kobject_cleanup() and to the
'dev' is freed in release function.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < affe3cea6b3148fa66796a48640664822ceccd48
Version 2e4c77bea3d8b17d94f8ee382411f359b708560f
Status affected
Version < 4b68caa95064ac464f1b261d08ac677e753d1088
Version 2e4c77bea3d8b17d94f8ee382411f359b708560f
Status affected
Version < a524e7fed696a4dfef671e0fda3511bfd2dca0cf
Version 2e4c77bea3d8b17d94f8ee382411f359b708560f
Status affected
Version < da64e01da40c6b71a54144126da53cc3b27201ac
Version 2e4c77bea3d8b17d94f8ee382411f359b708560f
Status affected
Version < fce9890e1be4c0460dad850cc8c00414a9d25f0f
Version 2e4c77bea3d8b17d94f8ee382411f359b708560f
Status affected
Version < a0ead7e8da84f4c3759417b8e928b65e0207c646
Version 2e4c77bea3d8b17d94f8ee382411f359b708560f
Status affected
Version < 8e002b9fe831b27d4506df6fa60cb33ba0730ac3
Version 2e4c77bea3d8b17d94f8ee382411f359b708560f
Status affected
Version < 78fddc0ff971f9874d53c854818cc4aafa144114
Version 2e4c77bea3d8b17d94f8ee382411f359b708560f
Status affected
Version < e63e99397b2613d50a5f4f02ed07307e67a190f1
Version 2e4c77bea3d8b17d94f8ee382411f359b708560f
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 2.6.29
Status affected
Version < 2.6.29
Version 0
Status unaffected
Version <= 4.9.*
Version 4.9.337
Status unaffected
Version <= 4.14.*
Version 4.14.303
Status unaffected
Version <= 4.19.*
Version 4.19.270
Status unaffected
Version <= 5.4.*
Version 5.4.229
Status unaffected
Version <= 5.10.*
Version 5.10.163
Status unaffected
Version <= 5.15.*
Version 5.15.86
Status unaffected
Version <= 6.0.*
Version 6.0.16
Status unaffected
Version <= 6.1.*
Version 6.1.2
Status unaffected
Version <= *
Version 6.2
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.05% 0.145
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
Es wurden noch keine Informationen zu CWE veröffentlicht.