CVE-2022-50469

Source
https://cve.org/CVERecord?id=CVE-2022-50469
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50469.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-50469
Downstream
Related
Published
2025-10-01T11:45:39.811Z
Modified
2026-04-02T08:28:32.473424Z
Summary
staging: rtl8723bs: fix potential memory leak in rtw_init_drv_sw()
Details

In the Linux kernel, the following vulnerability has been resolved:

staging: rtl8723bs: fix potential memory leak in rtwinitdrv_sw()

In rtwinitdrv_sw(), there are various init functions are called to populate the padapter structure and some checks for their return value. However, except for the first one error path, the other five error paths do not properly release the previous allocated resources, which leads to various memory leaks.

This patch fixes them and keeps the success and error separate. Note that these changes keep the form of rtw_init_drv_sw() in "drivers/staging/r8188eu/osdep/osintfs.c". As there is no proper device to test with, no runtime testing was performed.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50469.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
554c0a3abf216c991c5ebddcdb2c08689ecd290b
Fixed
b4573a2bad3c3e2643ef3939079eb7035a30e6ee
Fixed
6b2052b365f8035ab7f09ac24b5b499002b298cb
Fixed
d95d1526d9f06978c1a7186810a5490d72c62742
Fixed
5a5aa9cce621e2c0e25a1e5d72d6be1749167cc0

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50469.json"