-

CVE-2022-50544

In the Linux kernel, the following vulnerability has been resolved:

usb: host: xhci: Fix potential memory leak in xhci_alloc_stream_info()

xhci_alloc_stream_info() allocates stream context array for stream_info
->stream_ctx_array with xhci_alloc_stream_ctx(). When some error occurs,
stream_info->stream_ctx_array is not released, which will lead to a
memory leak.

We can fix it by releasing the stream_info->stream_ctx_array with
xhci_free_stream_ctx() on the error path to avoid the potential memory
leak.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < 7fc6bab3413e6a42bb1264ff7c9149808c93a4c7
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < e702de2f5c893bf2cdb0152191f99a6ad1411823
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < ddab9fe76296840aad686c66888a9c1dfdbff5ff
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 9fa81cbd2dd300aa8fe9bac70e068b9a11cbb144
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 91271a3e772e180bbb8afb114c72fd294a02f93d
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < fcd594da0b5955119d9707e4e0a8d0fb1c969101
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < a40ad475236022f3432880e3091c380e46e71a71
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 782c873f8e7686f5b3c47e8b099f7e08c3dd1fdc
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 7e271f42a5cc3768cd2622b929ba66859ae21f97
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version <= 4.9.*
Version 4.9.331
Status unaffected
Version <= 4.14.*
Version 4.14.296
Status unaffected
Version <= 4.19.*
Version 4.19.262
Status unaffected
Version <= 5.4.*
Version 5.4.220
Status unaffected
Version <= 5.10.*
Version 5.10.150
Status unaffected
Version <= 5.15.*
Version 5.15.75
Status unaffected
Version <= 5.19.*
Version 5.19.17
Status unaffected
Version <= 6.0.*
Version 6.0.3
Status unaffected
Version <= *
Version 6.1
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string