CVE-2022-50140

In the Linux kernel, the following vulnerability has been resolved: memstick/ms_block: Fix a memory leak 'erased_blocks_bitmap' is never freed. As it is allocated at the same time as 'used_blocks_bitmap', it is likely that it should be freed also at the same time. Add the corresponding bitmap_free() in msb_data_clear().
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

18 Nov 2025, 02:56

Type Values Removed Values Added
CWE CWE-401
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: memstick/ms_block: Se corrige una fuga de memoria: la variable 'erased_blocks_bitmap' nunca se libera. Dado que se asigna al mismo tiempo que 'used_blocks_bitmap', es probable que deba liberarse también simultáneamente. Agregue el bitmap_free() correspondiente en msb_data_clear().
References () https://git.kernel.org/stable/c/16e07966638717416abf45393d6a80a5a1034429 - () https://git.kernel.org/stable/c/16e07966638717416abf45393d6a80a5a1034429 - Patch
References () https://git.kernel.org/stable/c/37958980eb4cd71ae594ace093c11b6a91e165e8 - () https://git.kernel.org/stable/c/37958980eb4cd71ae594ace093c11b6a91e165e8 - Patch
References () https://git.kernel.org/stable/c/39be95d1ff7b44c1e969af72ba9da7332dfcc1da - () https://git.kernel.org/stable/c/39be95d1ff7b44c1e969af72ba9da7332dfcc1da - Patch
References () https://git.kernel.org/stable/c/54eb7a55be6779c4d0c25eaf5056498a28595049 - () https://git.kernel.org/stable/c/54eb7a55be6779c4d0c25eaf5056498a28595049 - Patch
References () https://git.kernel.org/stable/c/9260a154b3b5e387dbceec7c0ac441470646bc6f - () https://git.kernel.org/stable/c/9260a154b3b5e387dbceec7c0ac441470646bc6f - Patch
References () https://git.kernel.org/stable/c/961d7d12080fe70847f944d656e36cd0dd0214ba - () https://git.kernel.org/stable/c/961d7d12080fe70847f944d656e36cd0dd0214ba - Patch
References () https://git.kernel.org/stable/c/9d8b911fe3c3ed788c66edba7c90e32a4a7a5f53 - () https://git.kernel.org/stable/c/9d8b911fe3c3ed788c66edba7c90e32a4a7a5f53 - Patch
References () https://git.kernel.org/stable/c/efd675246aec045507b9425c67b548cc2d782d8f - () https://git.kernel.org/stable/c/efd675246aec045507b9425c67b548cc2d782d8f - Patch
First Time Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

18 Jun 2025, 11:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-18 11:15

Updated : 2025-11-18 02:56


NVD link : CVE-2022-50140

Mitre link : CVE-2022-50140

CVE.ORG link : CVE-2022-50140


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-401

Missing Release of Memory after Effective Lifetime