Executive Summary



This vulnerability is currently undergoing analysis and not all information is available. Please check back soon to view the completed vulnerability summary
Informations
Name CVE-2022-50038 First vendor Publication 2025-06-18
Vendor Cve Last vendor Modification 2025-06-18

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

drm/meson: Fix refcount bugs in meson_vpu_has_available_connectors()

In this function, there are two refcount leak bugs: (1) when breaking out of for_each_endpoint_of_node(), we need call the of_node_put() for the 'ep'; (2) we should call of_node_put() for the reference returned by of_graph_get_remote_port() when it is not used anymore.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50038

Sources (Detail)

https://git.kernel.org/stable/c/3aa710e96747c8b4e52ba12ffe09edcb2755897c
https://git.kernel.org/stable/c/6a758f0ba11699837af9e1a0f7cbac6ef765a23e
https://git.kernel.org/stable/c/8dec38e19f6928235d4009ce55f7add8af34e5c7
https://git.kernel.org/stable/c/91b3c8dbe898df158fd2a84675f3a284ff6666f7
https://git.kernel.org/stable/c/d58ef256781398ad115aef44de0a02ad27ea6c3a
https://git.kernel.org/stable/c/fc1fc2abfcb9235d0ece9a4d858426fb617cfa66
https://git.kernel.org/stable/c/fe71d84c1a6c0d54657431e8eeaefc9d24895304
Source Url

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2025-06-18 17:20:34
  • First insertion