Home

Description

In the Linux kernel, the following vulnerability has been resolved: staging: rtl8723bs: fix a potential memory leak in rtw_init_cmd_priv() In rtw_init_cmd_priv(), if `pcmdpriv->rsp_allocated_buf` is allocated in failure, then `pcmdpriv->cmd_allocated_buf` will be not properly released. Besides, considering there are only two error paths and the first one can directly return, so we do not need implicitly jump to the `exit` tag to execute the error handler. So this patch added `kfree(pcmdpriv->cmd_allocated_buf);` on the error path to release the resource and simplified the return logic of rtw_init_cmd_priv(). As there is no proper device to test with, no runtime testing was performed.

PUBLISHED Reserved 2025-10-07 | Published 2025-10-07 | Updated 2025-10-07 | Assigner Linux

Product status

Default status
unaffected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before e5d8f05edb36fc4ab15beec62cb6ab62f5a60fe2
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before e6cc39db24a63f68314473621020ed8cad7be423
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 39bef9c6a91bbb790d04c1347cfeae584541fb6a
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before a5be64ff6d21f7805a91e6d81f53fc19cd9f0fae
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 8db6ca84eee0ac258706f3fca54f7c021cb159ef
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 708056fba733a73d926772ea4ce9a42d240345da
affected

Default status
affected

5.4.220
unaffected

5.10.150
unaffected

5.15.75
unaffected

5.19.17
unaffected

6.0.3
unaffected

6.1
unaffected

References

git.kernel.org/...c/e5d8f05edb36fc4ab15beec62cb6ab62f5a60fe2

git.kernel.org/...c/e6cc39db24a63f68314473621020ed8cad7be423

git.kernel.org/...c/39bef9c6a91bbb790d04c1347cfeae584541fb6a

git.kernel.org/...c/a5be64ff6d21f7805a91e6d81f53fc19cd9f0fae

git.kernel.org/...c/8db6ca84eee0ac258706f3fca54f7c021cb159ef

git.kernel.org/...c/708056fba733a73d926772ea4ce9a42d240345da

cve.org (CVE-2022-50513)

nvd.nist.gov (CVE-2022-50513)

Download JSON