-
CVE-2022-50513
- EPSS 0.02%
- Veröffentlicht 07.10.2025 15:19:09
- Zuletzt bearbeitet 08.10.2025 19:38:32
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- Teams Watchlist Login
- Unerledigt Login
In the Linux kernel, the following vulnerability has been resolved: staging: rtl8723bs: fix a potential memory leak in rtw_init_cmd_priv() In rtw_init_cmd_priv(), if `pcmdpriv->rsp_allocated_buf` is allocated in failure, then `pcmdpriv->cmd_allocated_buf` will be not properly released. Besides, considering there are only two error paths and the first one can directly return, so we do not need implicitly jump to the `exit` tag to execute the error handler. So this patch added `kfree(pcmdpriv->cmd_allocated_buf);` on the error path to release the resource and simplified the return logic of rtw_init_cmd_priv(). As there is no proper device to test with, no runtime testing was performed.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
e5d8f05edb36fc4ab15beec62cb6ab62f5a60fe2
Version
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status
affected
Version <
e6cc39db24a63f68314473621020ed8cad7be423
Version
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status
affected
Version <
39bef9c6a91bbb790d04c1347cfeae584541fb6a
Version
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status
affected
Version <
a5be64ff6d21f7805a91e6d81f53fc19cd9f0fae
Version
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status
affected
Version <
8db6ca84eee0ac258706f3fca54f7c021cb159ef
Version
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status
affected
Version <
708056fba733a73d926772ea4ce9a42d240345da
Version
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version <=
5.4.*
Version
5.4.220
Status
unaffected
Version <=
5.10.*
Version
5.10.150
Status
unaffected
Version <=
5.15.*
Version
5.15.75
Status
unaffected
Version <=
5.19.*
Version
5.19.17
Status
unaffected
Version <=
6.0.*
Version
6.0.3
Status
unaffected
Version <=
*
Version
6.1
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.02% | 0.053 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|