{"id":"CVE-2022-50660","summary":"wifi: ipw2200: fix memory leak in ipw_wdev_init()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ipw2200: fix memory leak in ipw_wdev_init()\n\nIn the error path of ipw_wdev_init(), exception value is returned, and\nthe memory applied for in the function is not released. Also the memory\nis not released in ipw_pci_probe(). As a result, memory leakage occurs.\nSo memory release needs to be added to the error path of ipw_wdev_init().","modified":"2026-03-20T12:22:36.926362Z","published":"2025-12-09T01:29:08.387Z","related":["SUSE-SU-2026:0263-1","SUSE-SU-2026:0317-1","SUSE-SU-2026:0411-1","SUSE-SU-2026:0617-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50660.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/112c1af02b8f535baf42ef9d807aea963705ef15"},{"type":"WEB","url":"https://git.kernel.org/stable/c/1f590fb3d14e5db3a9e06ee141b1685c429278ce"},{"type":"WEB","url":"https://git.kernel.org/stable/c/62ec7e8bf42f1542f966dda687c654aae81718c8"},{"type":"WEB","url":"https://git.kernel.org/stable/c/75d20ba9506eb90d92e660e04dd887ff1495fcc3"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8a2eb9d9d0c1535bc8e22840193bff4cdcac878b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/9424ea9d557ef41d86eb40b6349ae991c3dcff89"},{"type":"WEB","url":"https://git.kernel.org/stable/c/9fe21dc626117fb44a8eb393713a86a620128ce3"},{"type":"WEB","url":"https://git.kernel.org/stable/c/fb3517b92a45c8004ac26250ae041a24eb23fef1"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50660.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50660"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"a3caa99e6c68f466c13cfea74097f6fb01b45e25"},{"fixed":"75d20ba9506eb90d92e660e04dd887ff1495fcc3"},{"fixed":"fb3517b92a45c8004ac26250ae041a24eb23fef1"},{"fixed":"112c1af02b8f535baf42ef9d807aea963705ef15"},{"fixed":"8a2eb9d9d0c1535bc8e22840193bff4cdcac878b"},{"fixed":"9424ea9d557ef41d86eb40b6349ae991c3dcff89"},{"fixed":"62ec7e8bf42f1542f966dda687c654aae81718c8"},{"fixed":"1f590fb3d14e5db3a9e06ee141b1685c429278ce"},{"fixed":"9fe21dc626117fb44a8eb393713a86a620128ce3"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50660.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"2.6.33"},{"fixed":"4.14.308"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.15.0"},{"fixed":"4.19.276"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.20.0"},{"fixed":"5.4.235"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.5.0"},{"fixed":"5.10.173"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.99"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.16"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.2.3"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50660.json"}}],"schema_version":"1.7.5"}