{"id":"CVE-2022-50290","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: fix memory leak in ieee80211_if_add()\n\nWhen register_netdevice() failed in ieee80211_if_add(), ndev-\u003etstats\nisn't released. Fix it.","modified":"2025-09-15T20:44:20.317156Z","published":"2025-09-15T15:15:40Z","withdrawn":"2025-09-16T06:59:25.962709Z","references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/13e5afd3d773c6fc6ca2b89027befaaaa1ea7293"},{"type":"WEB","url":"https://git.kernel.org/stable/c/147537737a3c83e07a5295de38424c21d354d2a4"},{"type":"WEB","url":"https://git.kernel.org/stable/c/2e32f1299814e8aa2e75aa58704543a36ea3e201"},{"type":"WEB","url":"https://git.kernel.org/stable/c/9a50a7f64243bd21a84353c371f3977b9ffd9fa5"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b2c0b94f48373ee743a4d63825a9d52364418837"},{"type":"ADVISORY","url":"https://security-tracker.debian.org/tracker/CVE-2022-50290"}],"affected":[{"package":{"name":"linux","ecosystem":"Debian:11","purl":"pkg:deb/debian/linux?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.10.178-1"}]}],"versions":["5.10.103-1","5.10.103-1~bpo10+1","5.10.106-1","5.10.113-1","5.10.120-1","5.10.120-1~bpo10+1","5.10.127-1","5.10.127-2","5.10.127-2~bpo10+1","5.10.136-1","5.10.140-1","5.10.148-1","5.10.149-1","5.10.149-2","5.10.158-1","5.10.158-2","5.10.162-1","5.10.46-4","5.10.46-5","5.10.70-1","5.10.70-1~bpo10+1","5.10.84-1","5.10.92-1","5.10.92-1~bpo10+1","5.10.92-2"],"ecosystem_specific":{"urgency":"not yet assigned"},"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50290.json"}},{"package":{"name":"linux","ecosystem":"Debian:12","purl":"pkg:deb/debian/linux?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"6.1.4-1"}]}],"ecosystem_specific":{"urgency":"not yet assigned"},"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50290.json"}},{"package":{"name":"linux","ecosystem":"Debian:13","purl":"pkg:deb/debian/linux?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"6.1.4-1"}]}],"ecosystem_specific":{"urgency":"not yet assigned"},"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50290.json"}},{"package":{"name":"linux","ecosystem":"Debian:14","purl":"pkg:deb/debian/linux?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"6.1.4-1"}]}],"ecosystem_specific":{"urgency":"not yet assigned"},"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50290.json"}}],"schema_version":"1.7.3"}