-
CVE-2022-50544
- EPSS -
- Published 07.10.2025 15:21:08
- Last modified 07.10.2025 16:15:38
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- Teams watchlist Login
- Open Login
In the Linux kernel, the following vulnerability has been resolved: usb: host: xhci: Fix potential memory leak in xhci_alloc_stream_info() xhci_alloc_stream_info() allocates stream context array for stream_info ->stream_ctx_array with xhci_alloc_stream_ctx(). When some error occurs, stream_info->stream_ctx_array is not released, which will lead to a memory leak. We can fix it by releasing the stream_info->stream_ctx_array with xhci_free_stream_ctx() on the error path to avoid the potential memory leak.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
≫
Product
Linux
Default Statusunaffected
Version <
7fc6bab3413e6a42bb1264ff7c9149808c93a4c7
Version
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status
affected
Version <
e702de2f5c893bf2cdb0152191f99a6ad1411823
Version
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status
affected
Version <
ddab9fe76296840aad686c66888a9c1dfdbff5ff
Version
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status
affected
Version <
9fa81cbd2dd300aa8fe9bac70e068b9a11cbb144
Version
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status
affected
Version <
91271a3e772e180bbb8afb114c72fd294a02f93d
Version
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status
affected
Version <
fcd594da0b5955119d9707e4e0a8d0fb1c969101
Version
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status
affected
Version <
a40ad475236022f3432880e3091c380e46e71a71
Version
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status
affected
Version <
782c873f8e7686f5b3c47e8b099f7e08c3dd1fdc
Version
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status
affected
Version <
7e271f42a5cc3768cd2622b929ba66859ae21f97
Version
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status
affected
VendorLinux
≫
Product
Linux
Default Statusaffected
Version <=
4.9.*
Version
4.9.331
Status
unaffected
Version <=
4.14.*
Version
4.14.296
Status
unaffected
Version <=
4.19.*
Version
4.19.262
Status
unaffected
Version <=
5.4.*
Version
5.4.220
Status
unaffected
Version <=
5.10.*
Version
5.10.150
Status
unaffected
Version <=
5.15.*
Version
5.15.75
Status
unaffected
Version <=
5.19.*
Version
5.19.17
Status
unaffected
Version <=
6.0.*
Version
6.0.3
Status
unaffected
Version <=
*
Version
6.1
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|