-

CVE-2022-50761

In the Linux kernel, the following vulnerability has been resolved:

x86/xen: Fix memory leak in xen_init_lock_cpu()

In xen_init_lock_cpu(), the @name has allocated new string by kasprintf(),
if bind_ipi_to_irqhandler() fails, it should be freed, otherwise may lead
to a memory leak issue, fix it.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < 9278bdbb566656b3704704f8dd6cbc24a6fcc569
Version 2d9e1e2f58b5612aa4eab0ab54c84308a29dbd79
Status affected
Version < 07764d00c869a3390bd4f80412cc8b0e669e6c58
Version 2d9e1e2f58b5612aa4eab0ab54c84308a29dbd79
Status affected
Version < 53ff99c76be611acea37d33133c9136969914865
Version 2d9e1e2f58b5612aa4eab0ab54c84308a29dbd79
Status affected
Version < 29198f667f4486f9e227e11faf1411fcf4c82a66
Version 2d9e1e2f58b5612aa4eab0ab54c84308a29dbd79
Status affected
Version < 70e7f308d7a8e915c7fbc0f1d959968eab8000cd
Version 2d9e1e2f58b5612aa4eab0ab54c84308a29dbd79
Status affected
Version < 70966d6b0f59f795b08a70adf5e4478348ecbfbb
Version 2d9e1e2f58b5612aa4eab0ab54c84308a29dbd79
Status affected
Version < 798fc3cf98ca07e448956f39295c5d686ab4b054
Version 2d9e1e2f58b5612aa4eab0ab54c84308a29dbd79
Status affected
Version < b44457b83a034efef58ffa5f3131d4615f1a9837
Version 2d9e1e2f58b5612aa4eab0ab54c84308a29dbd79
Status affected
Version < ca84ce153d887b1dc8b118029976cc9faf2a9b40
Version 2d9e1e2f58b5612aa4eab0ab54c84308a29dbd79
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 2.6.27
Status affected
Version < 2.6.27
Version 0
Status unaffected
Version <= 4.9.*
Version 4.9.337
Status unaffected
Version <= 4.14.*
Version 4.14.303
Status unaffected
Version <= 4.19.*
Version 4.19.270
Status unaffected
Version <= 5.4.*
Version 5.4.229
Status unaffected
Version <= 5.10.*
Version 5.10.163
Status unaffected
Version <= 5.15.*
Version 5.15.86
Status unaffected
Version <= 6.0.*
Version 6.0.16
Status unaffected
Version <= 6.1.*
Version 6.1.2
Status unaffected
Version <= *
Version 6.2
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.06% 0.198
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
Es wurden noch keine Informationen zu CWE veröffentlicht.