Executive Summary



This vulnerability is currently undergoing analysis and not all information is available. Please check back soon to view the completed vulnerability summary
Informations
Name CVE-2022-50106 First vendor Publication 2025-06-18
Vendor Cve Last vendor Modification 2025-06-18

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

powerpc/cell/axon_msi: Fix refcount leak in setup_msi_msg_address

of_get_next_parent() returns a node pointer with refcount incremented, we should use of_node_put() on it when not need anymore. Add missing of_node_put() in the error path to avoid refcount leak.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50106

Sources (Detail)

https://git.kernel.org/stable/c/00dc7cbbb558955ff410fd392cc9b0366eb06df0
https://git.kernel.org/stable/c/02ed44125d7a7238999750ca126b60f8dd7a88b1
https://git.kernel.org/stable/c/51cf876b11fb6ca06f69e9d1de58f892d1522e9d
https://git.kernel.org/stable/c/5eaa93caa63abf382b319dbe2f032232026740c2
https://git.kernel.org/stable/c/6263ec8032c411b8ef6b7f00198cb18c855ee6cb
https://git.kernel.org/stable/c/af41cff4ada533b1cf40de6c468ba164fd32c22d
https://git.kernel.org/stable/c/df5d4b616ee76abc97e5bd348e22659c2b095b1c
https://git.kernel.org/stable/c/f388643657cd5a04dc47a68d85321876c5b4c208
Source Url

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2025-06-18 17:20:34
  • First insertion