Description
In the Linux kernel, the following vulnerability has been resolved:
x86/xen: Fix memory leak in xen_init_lock_cpu()
In xen_init_lock_cpu(), the @name has allocated new string by kasprintf(),
if bind_ipi_to_irqhandler() fails, it should be freed, otherwise may lead
to a memory leak issue, fix it.
x86/xen: Fix memory leak in xen_init_lock_cpu()
In xen_init_lock_cpu(), the @name has allocated new string by kasprintf(),
if bind_ipi_to_irqhandler() fails, it should be freed, otherwise may lead
to a memory leak issue, fix it.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
History
Thu, 25 Dec 2025 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Wed, 24 Dec 2025 13:15:00 +0000
Status: PUBLISHED
Assigner: Linux
Published:
Updated: 2025-12-24T13:05:53.312Z
Reserved: 2025-12-24T13:02:21.545Z
Link: CVE-2022-50761
No data.
Status : Deferred
Published: 2025-12-24T13:16:02.873
Modified: 2026-04-15T00:35:42.020
Link: CVE-2022-50761
OpenCVE Enrichment
No data.
Weaknesses
No weakness.