-

CVE-2022-50201

In the Linux kernel, the following vulnerability has been resolved:

selinux: fix memleak in security_read_state_kernel()

In this function, it directly returns the result of __security_read_policy
without freeing the allocated memory in *data, cause memory leak issue,
so free the memory if __security_read_policy failed.

[PM: subject line tweak]

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < c877c5217145bda8fd95f506bf42f8d981afa57d
Version fdd1ffe8a812b1109388e4bc389e57b2695ad095
Status affected
Version < f3cd7562c0a6774fc62d79654482014020e574f5
Version fdd1ffe8a812b1109388e4bc389e57b2695ad095
Status affected
Version < 1fc1f72aad2070d34022d0823e4cf09706b53f25
Version fdd1ffe8a812b1109388e4bc389e57b2695ad095
Status affected
Version < 73de1befcc53a7c68b0c5e76b9b5ac41c517760f
Version fdd1ffe8a812b1109388e4bc389e57b2695ad095
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 5.12
Status affected
Version < 5.12
Version 0
Status unaffected
Version <= 5.15.*
Version 5.15.61
Status unaffected
Version <= 5.18.*
Version 5.18.18
Status unaffected
Version <= 5.19.*
Version 5.19.2
Status unaffected
Version <= *
Version 6.0
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.03% 0.056
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string