vulnerability
Ubuntu: (CVE-2022-50469): linux vulnerability
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:L/AC:L/Au:S/C:N/I:N/A:C) | Oct 1, 2025 | Oct 10, 2025 | Oct 24, 2025 |
Description
In the Linux kernel, the following vulnerability has been resolved: staging: rtl8723bs: fix potential memory leak in rtw_init_drv_sw() In rtw_init_drv_sw(), there are various init functions are called to populate the padapter structure and some checks for their return value. However, except for the first one error path, the other five error paths do not properly release the previous allocated resources, which leads to various memory leaks. This patch fixes them and keeps the success and error separate. Note that these changes keep the form of `rtw_init_drv_sw()` in "drivers/staging/r8188eu/os_dep/os_intfs.c". As there is no proper device to test with, no runtime testing was performed.
Solutions
References
- CVE-2022-50469
- https://attackerkb.com/topics/CVE-2022-50469
- URL-https://git.kernel.org/linus/5a5aa9cce621e2c0e25a1e5d72d6be1749167cc0
- URL-https://git.kernel.org/stable/c/5a5aa9cce621e2c0e25a1e5d72d6be1749167cc0
- URL-https://git.kernel.org/stable/c/6b2052b365f8035ab7f09ac24b5b499002b298cb
- URL-https://git.kernel.org/stable/c/b4573a2bad3c3e2643ef3939079eb7035a30e6ee
- URL-https://git.kernel.org/stable/c/d95d1526d9f06978c1a7186810a5490d72c62742
- URL-https://www.cve.org/CVERecord?id=CVE-2022-50469
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.