-

CVE-2022-50513

In the Linux kernel, the following vulnerability has been resolved:

staging: rtl8723bs: fix a potential memory leak in rtw_init_cmd_priv()

In rtw_init_cmd_priv(), if `pcmdpriv->rsp_allocated_buf` is allocated
in failure, then `pcmdpriv->cmd_allocated_buf` will be not properly
released. Besides, considering there are only two error paths and the
first one can directly return, so we do not need implicitly jump to the
`exit` tag to execute the error handler.

So this patch added `kfree(pcmdpriv->cmd_allocated_buf);` on the error
path to release the resource and simplified the return logic of
rtw_init_cmd_priv(). As there is no proper device to test with, no runtime
testing was performed.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < e5d8f05edb36fc4ab15beec62cb6ab62f5a60fe2
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < e6cc39db24a63f68314473621020ed8cad7be423
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 39bef9c6a91bbb790d04c1347cfeae584541fb6a
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < a5be64ff6d21f7805a91e6d81f53fc19cd9f0fae
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 8db6ca84eee0ac258706f3fca54f7c021cb159ef
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 708056fba733a73d926772ea4ce9a42d240345da
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version <= 5.4.*
Version 5.4.220
Status unaffected
Version <= 5.10.*
Version 5.10.150
Status unaffected
Version <= 5.15.*
Version 5.15.75
Status unaffected
Version <= 5.19.*
Version 5.19.17
Status unaffected
Version <= 6.0.*
Version 6.0.3
Status unaffected
Version <= *
Version 6.1
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.02% 0.053
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String