DEBIAN-CVE-2022-50626

Source
https://security-tracker.debian.org/tracker/CVE-2022-50626
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2022-50626.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2022-50626
Upstream
Published
2025-12-08T02:15:48.653Z
Modified
2025-12-08T11:06:35.379491Z
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved: media: dvb-usb: fix memory leak in dvbusbadapterinit() Syzbot reports a memory leak in "dvbusbadapterinit()". The leak is due to not accounting for and freeing current iteration's adapter->priv in case of an error. Currently if an error occurs, it will exit before incrementing "numadaptersinitalized", which is used as a reference counter to free all adap->priv in "dvbusbadapterexit()". There are multiple error paths that can exit from before incrementing the counter. Including the error handling paths for "dvbusbadapterstreaminit()", "dvbusbadapterdvbinit()" and "dvbusbadapterfrontendinit()" within "dvbusbadapterinit()". This means that in case of an error in any of these functions the current iteration is not accounted for and the current iteration's adap->priv is not freed. Fix this by freeing the current iteration's adap->priv in the "streaminiterr:" label in the error path. The rest of the (accounted for) adap->priv objects are freed in dvbusbadapterexit() as expected using the numadaptersinitalized variable. Syzbot report: BUG: memory leak unreferenced object 0xffff8881172f1a00 (size 512): comm "kworker/0:2", pid 139, jiffies 4294994873 (age 10.960s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff844af012>] dvbusbadapterinit drivers/media/usb/dvb-usb/dvb-usb-init.c:75 [inline] [<ffffffff844af012>] dvbusbinit drivers/media/usb/dvb-usb/dvb-usb-init.c:184 [inline] [<ffffffff844af012>] dvbusbdeviceinit.cold+0x4e5/0x79e drivers/media/usb/dvb-usb/dvb-usb-init.c:308 [<ffffffff830db21d>] dib0700probe+0x8d/0x1b0 drivers/media/usb/dvb-usb/dib0700core.c:883 [<ffffffff82d3fdc7>] usbprobeinterface+0x177/0x370 drivers/usb/core/driver.c:396 [<ffffffff8274ab37>] calldriverprobe drivers/base/dd.c:542 [inline] [<ffffffff8274ab37>] reallyprobe.part.0+0xe7/0x310 drivers/base/dd.c:621 [<ffffffff8274ae6c>] reallyprobe drivers/base/dd.c:583 [inline] [<ffffffff8274ae6c>] _driverprobedevice+0x10c/0x1e0 drivers/base/dd.c:752 [<ffffffff8274af6a>] driverprobedevice+0x2a/0x120 drivers/base/dd.c:782 [<ffffffff8274b786>] _deviceattachdriver+0xf6/0x140 drivers/base/dd.c:899 [<ffffffff82747c87>] busforeachdrv+0xb7/0x100 drivers/base/bus.c:427 [<ffffffff8274b352>] _deviceattach+0x122/0x260 drivers/base/dd.c:970 [<ffffffff827498f6>] busprobedevice+0xc6/0xe0 drivers/base/bus.c:487 [<ffffffff82745cdb>] deviceadd+0x5fb/0xdf0 drivers/base/core.c:3405 [<ffffffff82d3d202>] usbsetconfiguration+0x8f2/0xb80 drivers/usb/core/message.c:2170 [<ffffffff82d4dbfc>] usbgenericdriverprobe+0x8c/0xc0 drivers/usb/core/generic.c:238 [<ffffffff82d3f49c>] usbprobedevice+0x5c/0x140 drivers/usb/core/driver.c:293 [<ffffffff8274ab37>] calldriverprobe drivers/base/dd.c:542 [inline] [<ffffffff8274ab37>] reallyprobe.part.0+0xe7/0x310 drivers/base/dd.c:621 [<ffffffff8274ae6c>] reallyprobe drivers/base/dd.c:583 [inline] [<ffffffff8274ae6c>] _driverprobe_device+0x10c/0x1e0 drivers/base/dd.c:752

References

Affected packages

Debian:11 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.10.178-1

Affected versions

5.*

5.10.46-4
5.10.46-5
5.10.70-1~bpo10+1
5.10.70-1
5.10.84-1
5.10.92-1~bpo10+1
5.10.92-1
5.10.92-2
5.10.103-1~bpo10+1
5.10.103-1
5.10.106-1
5.10.113-1
5.10.120-1~bpo10+1
5.10.120-1
5.10.127-1
5.10.127-2~bpo10+1
5.10.127-2
5.10.136-1
5.10.140-1
5.10.148-1
5.10.149-1
5.10.149-2
5.10.158-1
5.10.158-2
5.10.162-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source

"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2022-50626.json"

Debian:12 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.1.4-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source

"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2022-50626.json"

Debian:13 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.1.4-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source

"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2022-50626.json"

Debian:14 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.1.4-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source

"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2022-50626.json"