CVE-2022-50312
drivers: serial: jsm: fix some leaks in probe
Description
In the Linux kernel, the following vulnerability has been resolved: drivers: serial: jsm: fix some leaks in probe This error path needs to unwind instead of just returning directly.
INFO
Published Date :
Sept. 15, 2025, 3:15 p.m.
Last Modified :
Dec. 4, 2025, 3:22 p.m.
Remotely Exploit :
No
Source :
416baaa9-dc9f-4396-8d5f-8c081fb06d67
CVSS Scores
| Score | Version | Severity | Vector | Exploitability Score | Impact Score | Source |
|---|---|---|---|---|---|---|
| CVSS 3.1 | MEDIUM | [email protected] |
Solution
- Update the Linux kernel.
- Apply the jsm driver fix.
- Ensure proper error unwinding.
References to Advisories, Solutions, and Tools
Here, you will find a curated list of external links that provide in-depth
information, practical solutions, and valuable tools related to
CVE-2022-50312.
CWE - Common Weakness Enumeration
While CVE identifies
specific instances of vulnerabilities, CWE categorizes the common flaws or
weaknesses that can lead to vulnerabilities. CVE-2022-50312 is
associated with the following CWEs:
Common Attack Pattern Enumeration and Classification (CAPEC)
Common Attack Pattern Enumeration and Classification
(CAPEC)
stores attack patterns, which are descriptions of the common attributes and
approaches employed by adversaries to exploit the CVE-2022-50312
weaknesses.
We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).
Results are limited to the first 15 repositories due to potential performance issues.
The following list is the news that have been mention
CVE-2022-50312 vulnerability anywhere in the article.
The following table lists the changes that have been made to the
CVE-2022-50312 vulnerability over time.
Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.
-
Initial Analysis by [email protected]
Dec. 04, 2025
Action Type Old Value New Value Added CVSS V3.1 AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Added CWE CWE-401 Added CPE Configuration OR *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.0 up to (excluding) 6.0.3 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.10 up to (excluding) 4.14.296 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.15 up to (excluding) 4.19.262 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.20 up to (excluding) 5.4.220 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.5 up to (excluding) 5.10.150 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.11 up to (excluding) 5.15.75 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 3.19 up to (excluding) 4.9.331 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.16 up to (excluding) 5.19.17 Added Reference Type kernel.org: https://git.kernel.org/stable/c/1d5859ef229e381f4db38dce8ed58e4bf862006b Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/3bf05c2650cf6b8d83bf0b0d808cc78c6ee7e84c Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/3ea1fd63fdf0e83b491c2a9f25b395aa0e4bf6e8 Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/6066bd69ffba3a6abc7c0793ccba1da79b7d77e3 Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/6be8e565a4a60530797a974d0a3d0e30656166a1 Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/71ffe5111f0ffa2fd43c14fd176c6f05d4e82212 Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/737594536dc3ce732976c0d84bb1dcc842065521 Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/744c2d33a88b082d9d504520f0132b3d688547b2 Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/ff9a5e50fb1910be33e62925bc7ee3bef474879e Types: Patch -
New CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Sep. 15, 2025
Action Type Old Value New Value Added Description In the Linux kernel, the following vulnerability has been resolved: drivers: serial: jsm: fix some leaks in probe This error path needs to unwind instead of just returning directly. Added Reference https://git.kernel.org/stable/c/1d5859ef229e381f4db38dce8ed58e4bf862006b Added Reference https://git.kernel.org/stable/c/3bf05c2650cf6b8d83bf0b0d808cc78c6ee7e84c Added Reference https://git.kernel.org/stable/c/3ea1fd63fdf0e83b491c2a9f25b395aa0e4bf6e8 Added Reference https://git.kernel.org/stable/c/6066bd69ffba3a6abc7c0793ccba1da79b7d77e3 Added Reference https://git.kernel.org/stable/c/6be8e565a4a60530797a974d0a3d0e30656166a1 Added Reference https://git.kernel.org/stable/c/71ffe5111f0ffa2fd43c14fd176c6f05d4e82212 Added Reference https://git.kernel.org/stable/c/737594536dc3ce732976c0d84bb1dcc842065521 Added Reference https://git.kernel.org/stable/c/744c2d33a88b082d9d504520f0132b3d688547b2 Added Reference https://git.kernel.org/stable/c/ff9a5e50fb1910be33e62925bc7ee3bef474879e