-

CVE-2022-50513

In the Linux kernel, the following vulnerability has been resolved:

staging: rtl8723bs: fix a potential memory leak in rtw_init_cmd_priv()

In rtw_init_cmd_priv(), if `pcmdpriv->rsp_allocated_buf` is allocated
in failure, then `pcmdpriv->cmd_allocated_buf` will be not properly
released. Besides, considering there are only two error paths and the
first one can directly return, so we do not need implicitly jump to the
`exit` tag to execute the error handler.

So this patch added `kfree(pcmdpriv->cmd_allocated_buf);` on the error
path to release the resource and simplified the return logic of
rtw_init_cmd_priv(). As there is no proper device to test with, no runtime
testing was performed.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < e5d8f05edb36fc4ab15beec62cb6ab62f5a60fe2
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < e6cc39db24a63f68314473621020ed8cad7be423
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 39bef9c6a91bbb790d04c1347cfeae584541fb6a
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < a5be64ff6d21f7805a91e6d81f53fc19cd9f0fae
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 8db6ca84eee0ac258706f3fca54f7c021cb159ef
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 708056fba733a73d926772ea4ce9a42d240345da
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version <= 5.4.*
Version 5.4.220
Status unaffected
Version <= 5.10.*
Version 5.10.150
Status unaffected
Version <= 5.15.*
Version 5.15.75
Status unaffected
Version <= 5.19.*
Version 5.19.17
Status unaffected
Version <= 6.0.*
Version 6.0.3
Status unaffected
Version <= *
Version 6.1
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.02% 0.053
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string