CVE-2022-50707Missing Release of Memory after Effective Lifetime in Linux

7 documents6 sources
Severity
5.3MEDIUM
No vector
EPSS
0.0%
top 92.73%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 24

Description

In the Linux kernel, the following vulnerability has been resolved: virtio-crypto: fix memory leak in virtio_crypto_alg_skcipher_close_session() 'vc_ctrl_req' is alloced in virtio_crypto_alg_skcipher_close_session(), and should be freed in the invalid ctrl_status->status error handling case. Otherwise there is a memory leak.

Affected Packages4 packages

Linuxlinux/linux_kernel5.19.06.0.19+1
Debianlinux/linux_kernel< 6.1.7-1+2
CVEListV5linux/linux4ee475e76b5ea8061970a7c867ffa5eedeb3958079026a2d0a1b080257773d22a493f9bcab8c65be+4
debiandebian/linux< linux 6.1.7-1 (bookworm)

🔴Vulnerability Details

3
OSV
virtio-crypto: fix memory leak in virtio_crypto_alg_skcipher_close_session()2025-12-24
OSV
CVE-2022-50707: In the Linux kernel, the following vulnerability has been resolved: virtio-crypto: fix memory leak in virtio_crypto_alg_skcipher_close_session() 'vc_c2025-12-24
GHSA
GHSA-fv92-j7fm-4rhq: In the Linux kernel, the following vulnerability has been resolved: virtio-crypto: fix memory leak in virtio_crypto_alg_skcipher_close_session() 'vc2025-12-24

📋Vendor Advisories

2
Red Hat
kernel: virtio-crypto: fix memory leak in virtio_crypto_alg_skcipher_close_session()2025-12-24
Debian
CVE-2022-50707: linux - In the Linux kernel, the following vulnerability has been resolved: virtio-cryp...2022

🕵️Threat Intelligence

1
Wiz
CVE-2022-50707 Impact, Exploitability, and Mitigation Steps | Wiz