CVE-2022-49115

Source
https://cve.org/CVERecord?id=CVE-2022-49115
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49115.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49115
Downstream
Related
Published
2025-02-26T01:54:58.654Z
Modified
2026-04-11T12:43:34.995208Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
PCI: endpoint: Fix misused goto label
Details

In the Linux kernel, the following vulnerability has been resolved:

PCI: endpoint: Fix misused goto label

Fix a misused goto label jump since that can result in a memory leak.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49115.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
5ebf3fc59bd20d17df3ba26159787d13cf20d362
Fixed
7c657c0694ff690e361a13ce41c36b9dfb433ec8
Fixed
dc9d33b2d8d09e6478e8ef817a81cf26930acc3e
Fixed
70236a0d2d62b081d52076de22d8d017d6cbe99f
Fixed
d3642fc64276b06446290f82fd45630aeaa4b007
Fixed
bf8d87c076f55b8b4dfdb6bc6c6b6dc0c2ccb487

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49115.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.7.0
Fixed
5.10.111
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.34
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
5.16.20
Type
ECOSYSTEM
Events
Introduced
5.17.0
Fixed
5.17.3

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49115.json"