-
CVE-2022-50761
- EPSS 0.06%
- Veröffentlicht 24.12.2025 13:05:53
- Zuletzt bearbeitet 29.12.2025 15:58:34
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
In the Linux kernel, the following vulnerability has been resolved: x86/xen: Fix memory leak in xen_init_lock_cpu() In xen_init_lock_cpu(), the @name has allocated new string by kasprintf(), if bind_ipi_to_irqhandler() fails, it should be freed, otherwise may lead to a memory leak issue, fix it.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
9278bdbb566656b3704704f8dd6cbc24a6fcc569
Version
2d9e1e2f58b5612aa4eab0ab54c84308a29dbd79
Status
affected
Version <
07764d00c869a3390bd4f80412cc8b0e669e6c58
Version
2d9e1e2f58b5612aa4eab0ab54c84308a29dbd79
Status
affected
Version <
53ff99c76be611acea37d33133c9136969914865
Version
2d9e1e2f58b5612aa4eab0ab54c84308a29dbd79
Status
affected
Version <
29198f667f4486f9e227e11faf1411fcf4c82a66
Version
2d9e1e2f58b5612aa4eab0ab54c84308a29dbd79
Status
affected
Version <
70e7f308d7a8e915c7fbc0f1d959968eab8000cd
Version
2d9e1e2f58b5612aa4eab0ab54c84308a29dbd79
Status
affected
Version <
70966d6b0f59f795b08a70adf5e4478348ecbfbb
Version
2d9e1e2f58b5612aa4eab0ab54c84308a29dbd79
Status
affected
Version <
798fc3cf98ca07e448956f39295c5d686ab4b054
Version
2d9e1e2f58b5612aa4eab0ab54c84308a29dbd79
Status
affected
Version <
b44457b83a034efef58ffa5f3131d4615f1a9837
Version
2d9e1e2f58b5612aa4eab0ab54c84308a29dbd79
Status
affected
Version <
ca84ce153d887b1dc8b118029976cc9faf2a9b40
Version
2d9e1e2f58b5612aa4eab0ab54c84308a29dbd79
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
2.6.27
Status
affected
Version <
2.6.27
Version
0
Status
unaffected
Version <=
4.9.*
Version
4.9.337
Status
unaffected
Version <=
4.14.*
Version
4.14.303
Status
unaffected
Version <=
4.19.*
Version
4.19.270
Status
unaffected
Version <=
5.4.*
Version
5.4.229
Status
unaffected
Version <=
5.10.*
Version
5.10.163
Status
unaffected
Version <=
5.15.*
Version
5.15.86
Status
unaffected
Version <=
6.0.*
Version
6.0.16
Status
unaffected
Version <=
6.1.*
Version
6.1.2
Status
unaffected
Version <=
*
Version
6.2
Status
unaffected
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.06% | 0.198 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|