-
CVE-2022-50294
- EPSS 0.03%
- Veröffentlicht 15.09.2025 14:45:50
- Zuletzt bearbeitet 15.09.2025 15:22:27
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- Teams Watchlist Login
- Unerledigt Login
In the Linux kernel, the following vulnerability has been resolved: wifi: libertas: fix memory leak in lbs_init_adapter() When kfifo_alloc() failed in lbs_init_adapter(), cmd buffer is not released. Add free memory to processing error path.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
4c102ad59bfa66c0f6662af64fa3b9007b02c20f
Version
7919b89c8276d657976d4d4d6b7cb58ea1aa08c3
Status
affected
Version <
98e0ff6980c89239d9e5d3da90d791c2383dc23a
Version
7919b89c8276d657976d4d4d6b7cb58ea1aa08c3
Status
affected
Version <
23b34e08de5c2380414c9d3c33e8235094bcccae
Version
7919b89c8276d657976d4d4d6b7cb58ea1aa08c3
Status
affected
Version <
9c8f50c7433bdfba1588831c413136ecc3f29f99
Version
7919b89c8276d657976d4d4d6b7cb58ea1aa08c3
Status
affected
Version <
037f84c0bfae5c436c651d0e804264e2648010ec
Version
7919b89c8276d657976d4d4d6b7cb58ea1aa08c3
Status
affected
Version <
653d13a73e498d0bb6aeaf689aaa960defa7878b
Version
7919b89c8276d657976d4d4d6b7cb58ea1aa08c3
Status
affected
Version <
d46c33f667b05c22bc5c5b69aa730349c4b6fe31
Version
7919b89c8276d657976d4d4d6b7cb58ea1aa08c3
Status
affected
Version <
16a03958618fb91bb1bc7077cf3211055162cc2f
Version
7919b89c8276d657976d4d4d6b7cb58ea1aa08c3
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
2.6.26
Status
affected
Version <
2.6.26
Version
0
Status
unaffected
Version <=
4.14.*
Version
4.14.308
Status
unaffected
Version <=
4.19.*
Version
4.19.276
Status
unaffected
Version <=
5.4.*
Version
5.4.235
Status
unaffected
Version <=
5.10.*
Version
5.10.173
Status
unaffected
Version <=
5.15.*
Version
5.15.99
Status
unaffected
Version <=
6.1.*
Version
6.1.16
Status
unaffected
Version <=
6.2.*
Version
6.2.3
Status
unaffected
Version <=
*
Version
6.3
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.03% | 0.078 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|