CVE-2022-50758Missing Release of Memory after Effective Lifetime in Linux

7 documents6 sources
Severity
N/A
No vector
EPSS
0.0%
top 89.30%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 24

Description

In the Linux kernel, the following vulnerability has been resolved: staging: vt6655: fix potential memory leak In function device_init_td0_ring, memory is allocated for member td_info of priv->apTD0Rings[i], with i increasing from 0. In case of allocation failure, the memory is freed in reversed order, with i decreasing to 0. However, the case i=0 is left out and thus memory is leaked. Modify the memory freeing loop to include the case i=0.

Affected Packages4 packages

Linuxlinux/linux_kernel4.18.04.19.262+5
Debianlinux/linux_kernel< 5.10.158-1+3
CVEListV5linux/linux5341ee0adb17d12a96dc5344e0d267cd12b52135e741e38aa98704fbb959650ecd270b71b2670680+7
debiandebian/linux< linux 6.0.3-1 (bookworm)

🔴Vulnerability Details

3
OSV
staging: vt6655: fix potential memory leak2025-12-24
OSV
CVE-2022-50758: In the Linux kernel, the following vulnerability has been resolved: staging: vt6655: fix potential memory leak In function device_init_td0_ring, memor2025-12-24
GHSA
GHSA-35g5-mqjg-qfr4: In the Linux kernel, the following vulnerability has been resolved: staging: vt6655: fix potential memory leak In function device_init_td0_ring, mem2025-12-24

📋Vendor Advisories

2
Red Hat
kernel: staging: vt6655: fix potential memory leak2025-12-24
Debian
CVE-2022-50758: linux - In the Linux kernel, the following vulnerability has been resolved: staging: vt...2022

🕵️Threat Intelligence

1
Wiz
CVE-2022-50758 Impact, Exploitability, and Mitigation Steps | Wiz