-
CVE-2022-50242
- EPSS 0.04%
- Veröffentlicht 15.09.2025 14:01:50
- Zuletzt bearbeitet 15.09.2025 15:21:42
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- Teams Watchlist Login
- Unerledigt Login
In the Linux kernel, the following vulnerability has been resolved: drivers: net: qlcnic: Fix potential memory leak in qlcnic_sriov_init() If vp alloc failed in qlcnic_sriov_init(), all previously allocated vp needs to be freed.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
15770edc01edfce773269e8a443ca8e420f6f859
Version
f197a7aa62888f27c9a7976b18eb4f040f6606ce
Status
affected
Version <
0aefadf23ee5e33b747df195ace42d3be2025e4e
Version
f197a7aa62888f27c9a7976b18eb4f040f6606ce
Status
affected
Version <
132c502919bb08e16e3054cb28bb7b149ec20cf5
Version
f197a7aa62888f27c9a7976b18eb4f040f6606ce
Status
affected
Version <
a44490abaf00f5b0cc5c448a17eae331c6195d0a
Version
f197a7aa62888f27c9a7976b18eb4f040f6606ce
Status
affected
Version <
14b349a15c297cf3e01b5deb4116f7cf297b6184
Version
f197a7aa62888f27c9a7976b18eb4f040f6606ce
Status
affected
Version <
8399b9893548c03fdb18be277bf99d985dbde925
Version
f197a7aa62888f27c9a7976b18eb4f040f6606ce
Status
affected
Version <
aa2d179544b6815b4a23c0c44543ba0971d49fce
Version
f197a7aa62888f27c9a7976b18eb4f040f6606ce
Status
affected
Version <
dcae92a249551d1a447804b4be1c9fab0e8c95e8
Version
f197a7aa62888f27c9a7976b18eb4f040f6606ce
Status
affected
Version <
01de1123322e4fe1bbd0fcdf0982511b55519c03
Version
f197a7aa62888f27c9a7976b18eb4f040f6606ce
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
3.10
Status
affected
Version <
3.10
Version
0
Status
unaffected
Version <=
4.9.*
Version
4.9.337
Status
unaffected
Version <=
4.14.*
Version
4.14.303
Status
unaffected
Version <=
4.19.*
Version
4.19.270
Status
unaffected
Version <=
5.4.*
Version
5.4.229
Status
unaffected
Version <=
5.10.*
Version
5.10.163
Status
unaffected
Version <=
5.15.*
Version
5.15.86
Status
unaffected
Version <=
6.0.*
Version
6.0.16
Status
unaffected
Version <=
6.1.*
Version
6.1.2
Status
unaffected
Version <=
*
Version
6.2
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.04% | 0.126 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|