CVE-2022-50355Missing Release of Memory after Effective Lifetime in Linux

Severity
5.5MEDIUMNVD
EPSS
0.0%
top 95.77%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 17

Description

In the Linux kernel, the following vulnerability has been resolved: staging: vt6655: fix some erroneous memory clean-up loops In some initialization functions of this driver, memory is allocated with 'i' acting as an index variable and increasing from 0. The commit in "Fixes" introduces some clean-up codes in case of allocation failure, which free memory in reverse order with 'i' decreasing to 0. However, there are some problems: - The case i=0 is left out. Thus memory is leaked. - In case mem

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages4 packages

NVDlinux/linux_kernel4.184.19.262+5
Debianlinux/linux_kernel< 5.10.158-1+3
CVEListV5linux/linux5341ee0adb17d12a96dc5344e0d267cd12b52135637672a71f5016a40b0a6c0f3c8ad25eacedc8c3+7
debiandebian/linux< linux 6.0.3-1 (bookworm)

Patches

🔴Vulnerability Details

2
GHSA
GHSA-r7xh-cr9c-6wxq: In the Linux kernel, the following vulnerability has been resolved: staging: vt6655: fix some erroneous memory clean-up loops In some initialization2025-09-17
OSV
CVE-2022-50355: In the Linux kernel, the following vulnerability has been resolved: staging: vt6655: fix some erroneous memory clean-up loops In some initialization f2025-09-17

📋Vendor Advisories

2
Red Hat
kernel: staging: vt6655: fix some erroneous memory clean-up loops2025-09-17
Debian
CVE-2022-50355: linux - In the Linux kernel, the following vulnerability has been resolved: staging: vt...2022
CVE-2022-50355 — Linux vulnerability | cvebase