We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2022-50201

selinux: fix memleak in security_read_state_kernel()



Description

In the Linux kernel, the following vulnerability has been resolved: selinux: fix memleak in security_read_state_kernel() In this function, it directly returns the result of __security_read_policy without freeing the allocated memory in *data, cause memory leak issue, so free the memory if __security_read_policy failed. [PM: subject line tweak]

Reserved 2025-06-18 | Published 2025-06-18 | Updated 2025-06-18 | Assigner Linux

Product status

Default status
unaffected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before c877c5217145bda8fd95f506bf42f8d981afa57d
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before f3cd7562c0a6774fc62d79654482014020e574f5
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 1fc1f72aad2070d34022d0823e4cf09706b53f25
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 73de1befcc53a7c68b0c5e76b9b5ac41c517760f
affected

Default status
affected

5.15.61
unaffected

5.18.18
unaffected

5.19.2
unaffected

6.0
unaffected

References

git.kernel.org/...c/c877c5217145bda8fd95f506bf42f8d981afa57d

git.kernel.org/...c/f3cd7562c0a6774fc62d79654482014020e574f5

git.kernel.org/...c/1fc1f72aad2070d34022d0823e4cf09706b53f25

git.kernel.org/...c/73de1befcc53a7c68b0c5e76b9b5ac41c517760f

cve.org (CVE-2022-50201)

nvd.nist.gov (CVE-2022-50201)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2022-50201

Support options

Helpdesk Chat, Email, Knowledgebase