-
CVE-2022-50875
- EPSS 0.05%
- Veröffentlicht 30.12.2025 12:23:16
- Zuletzt bearbeitet 31.12.2025 20:43:05
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
In the Linux kernel, the following vulnerability has been resolved: of: overlay: fix null pointer dereferencing in find_dup_cset_node_entry() and find_dup_cset_prop() When kmalloc() fail to allocate memory in kasprintf(), fn_1 or fn_2 will be NULL, and strcmp() will cause null pointer dereference.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
9ec5781879b4535ad59b5354b385825378e45618
Version
2fe0e8769df9fed5098daea7db933bc414c329d7
Status
affected
Version <
2b4af99b44861646013821019dd13a4ac48c0219
Version
2fe0e8769df9fed5098daea7db933bc414c329d7
Status
affected
Version <
ce1b3a41e7964cb8dd56a702a95dd90ad27f51cd
Version
2fe0e8769df9fed5098daea7db933bc414c329d7
Status
affected
Version <
ab5bb7bbacf531de8e32912cc2e21f906113cee8
Version
2fe0e8769df9fed5098daea7db933bc414c329d7
Status
affected
Version <
71d88c7453ec3d2ceff98e18ce4d6354abd3b5b6
Version
2fe0e8769df9fed5098daea7db933bc414c329d7
Status
affected
Version <
ee9d7a0e754568180a2f8ebc4aad226278a9116f
Version
2fe0e8769df9fed5098daea7db933bc414c329d7
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
5.0
Status
affected
Version <
5.0
Version
0
Status
unaffected
Version <=
5.4.*
Version
5.4.229
Status
unaffected
Version <=
5.10.*
Version
5.10.163
Status
unaffected
Version <=
5.15.*
Version
5.15.86
Status
unaffected
Version <=
6.0.*
Version
6.0.16
Status
unaffected
Version <=
6.1.*
Version
6.1.2
Status
unaffected
Version <=
*
Version
6.2
Status
unaffected
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.05% | 0.143 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|