CVE-2022-50134

In the Linux kernel, the following vulnerability has been resolved: RDMA/hfi1: fix potential memory leak in setup_base_ctxt() setup_base_ctxt() allocates a memory chunk for uctxt->groups with hfi1_alloc_ctxt_rcv_groups(). When init_user_ctxt() fails, uctxt->groups is not released, which will lead to a memory leak. We should release the uctxt->groups with hfi1_free_ctxt_rcv_groups() when init_user_ctxt() fails.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

18 Nov 2025, 18:08

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: RDMA/hfi1: Se corrige una posible fuga de memoria en setup_base_ctxt(). setup_base_ctxt() asigna un fragmento de memoria para uctxt->groups con hfi1_alloc_ctxt_rcv_groups(). Cuando init_user_ctxt() falla, uctxt->groups no se libera, lo que provoca una fuga de memoria. Deberíamos liberar uctxt->groups con hfi1_free_ctxt_rcv_groups() cuando init_user_ctxt() falla.
CWE CWE-401
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/1750be1e9f18787cf717c24dbc5fa029fc372a22 - () https://git.kernel.org/stable/c/1750be1e9f18787cf717c24dbc5fa029fc372a22 - Patch
References () https://git.kernel.org/stable/c/2f90813f1c21c3d780585390af961bd17c8515ae - () https://git.kernel.org/stable/c/2f90813f1c21c3d780585390af961bd17c8515ae - Patch
References () https://git.kernel.org/stable/c/90ef48a718f88935d4af53d7dadd1ceafe103ce6 - () https://git.kernel.org/stable/c/90ef48a718f88935d4af53d7dadd1ceafe103ce6 - Patch
References () https://git.kernel.org/stable/c/a85c7dd1edadcdeca24e603a6618153a3bcc81ca - () https://git.kernel.org/stable/c/a85c7dd1edadcdeca24e603a6618153a3bcc81ca - Patch
References () https://git.kernel.org/stable/c/a9055dfe437efae77e28e57205437c878a03ccb7 - () https://git.kernel.org/stable/c/a9055dfe437efae77e28e57205437c878a03ccb7 - Patch
References () https://git.kernel.org/stable/c/aa2a1df3a2c85f855af7d54466ac10bd48645d63 - () https://git.kernel.org/stable/c/aa2a1df3a2c85f855af7d54466ac10bd48645d63 - Patch
References () https://git.kernel.org/stable/c/e25b828553aecb3185a8d8d0c4f9b4e133fb5db6 - () https://git.kernel.org/stable/c/e25b828553aecb3185a8d8d0c4f9b4e133fb5db6 - Patch
References () https://git.kernel.org/stable/c/fc4de8009fd6c2ca51986c6757efa964040e7d02 - () https://git.kernel.org/stable/c/fc4de8009fd6c2ca51986c6757efa964040e7d02 - Patch
First Time Linux
Linux linux Kernel
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

18 Jun 2025, 11:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-18 11:15

Updated : 2025-11-18 18:08


NVD link : CVE-2022-50134

Mitre link : CVE-2022-50134

CVE.ORG link : CVE-2022-50134


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-401

Missing Release of Memory after Effective Lifetime