-

CVE-2022-50201

In the Linux kernel, the following vulnerability has been resolved:

selinux: fix memleak in security_read_state_kernel()

In this function, it directly returns the result of __security_read_policy
without freeing the allocated memory in *data, cause memory leak issue,
so free the memory if __security_read_policy failed.

[PM: subject line tweak]

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < c877c5217145bda8fd95f506bf42f8d981afa57d
Version fdd1ffe8a812b1109388e4bc389e57b2695ad095
Status affected
Version < f3cd7562c0a6774fc62d79654482014020e574f5
Version fdd1ffe8a812b1109388e4bc389e57b2695ad095
Status affected
Version < 1fc1f72aad2070d34022d0823e4cf09706b53f25
Version fdd1ffe8a812b1109388e4bc389e57b2695ad095
Status affected
Version < 73de1befcc53a7c68b0c5e76b9b5ac41c517760f
Version fdd1ffe8a812b1109388e4bc389e57b2695ad095
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 5.12
Status affected
Version < 5.12
Version 0
Status unaffected
Version <= 5.15.*
Version 5.15.61
Status unaffected
Version <= 5.18.*
Version 5.18.18
Status unaffected
Version <= 5.19.*
Version 5.19.2
Status unaffected
Version <= *
Version 6.0
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.03% 0.056
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String