-

CVE-2022-50660

In the Linux kernel, the following vulnerability has been resolved:

wifi: ipw2200: fix memory leak in ipw_wdev_init()

In the error path of ipw_wdev_init(), exception value is returned, and
the memory applied for in the function is not released. Also the memory
is not released in ipw_pci_probe(). As a result, memory leakage occurs.
So memory release needs to be added to the error path of ipw_wdev_init().
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < 75d20ba9506eb90d92e660e04dd887ff1495fcc3
Version a3caa99e6c68f466c13cfea74097f6fb01b45e25
Status affected
Version < fb3517b92a45c8004ac26250ae041a24eb23fef1
Version a3caa99e6c68f466c13cfea74097f6fb01b45e25
Status affected
Version < 112c1af02b8f535baf42ef9d807aea963705ef15
Version a3caa99e6c68f466c13cfea74097f6fb01b45e25
Status affected
Version < 8a2eb9d9d0c1535bc8e22840193bff4cdcac878b
Version a3caa99e6c68f466c13cfea74097f6fb01b45e25
Status affected
Version < 9424ea9d557ef41d86eb40b6349ae991c3dcff89
Version a3caa99e6c68f466c13cfea74097f6fb01b45e25
Status affected
Version < 62ec7e8bf42f1542f966dda687c654aae81718c8
Version a3caa99e6c68f466c13cfea74097f6fb01b45e25
Status affected
Version < 1f590fb3d14e5db3a9e06ee141b1685c429278ce
Version a3caa99e6c68f466c13cfea74097f6fb01b45e25
Status affected
Version < 9fe21dc626117fb44a8eb393713a86a620128ce3
Version a3caa99e6c68f466c13cfea74097f6fb01b45e25
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 2.6.33
Status affected
Version < 2.6.33
Version 0
Status unaffected
Version <= 4.14.*
Version 4.14.308
Status unaffected
Version <= 4.19.*
Version 4.19.276
Status unaffected
Version <= 5.4.*
Version 5.4.235
Status unaffected
Version <= 5.10.*
Version 5.10.173
Status unaffected
Version <= 5.15.*
Version 5.15.99
Status unaffected
Version <= 6.1.*
Version 6.1.16
Status unaffected
Version <= 6.2.*
Version 6.2.3
Status unaffected
Version <= *
Version 6.3
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.02% 0.058
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String