Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: net: ethernet: ti: am65-cpsw: Fix PM runtime leakage in am65_cpsw_nuss_ndo_slave_open() Ensure pm_runtime_put() is issued in error path.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 5.7, < 6.0.16 |
References
- https://git.kernel.org/stable/c/2c14f5cf74c4995eaf284b496481866f012eba19Patch
- https://git.kernel.org/stable/c/5821504f5073983733465b8bc430049c4343bbd7Patch
- https://git.kernel.org/stable/c/a8846b3398600a632696b6cf79f8a44a107eb226Patch
FAQ
What is CVE-2022-50461?
CVE-2022-50461 is a vulnerability with a CVSS score of 5.5 (MEDIUM). In the Linux kernel, the following vulnerability has been resolved: net: ethernet: ti: am65-cpsw: Fix PM runtime leakage in am65_cpsw_nuss_ndo_slave_open() Ensure pm_runtime_put() is issued in error...
How severe is CVE-2022-50461?
CVE-2022-50461 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-50461?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.