[<prev] [next>] [day] [month] [year] [list]
Message-ID: <2025100100-CVE-2022-50438-1760@gregkh>
Date: Wed, 1 Oct 2025 13:42:11 +0200
From: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To: linux-cve-announce@...r.kernel.org
Cc: Greg Kroah-Hartman <gregkh@...nel.org>
Subject: CVE-2022-50438: net: hinic: fix memory leak when reading function table
From: Greg Kroah-Hartman <gregkh@...nel.org>
Description
===========
In the Linux kernel, the following vulnerability has been resolved:
net: hinic: fix memory leak when reading function table
When the input parameter idx meets the expected case option in
hinic_dbg_get_func_table(), read_data is not released. Fix it.
The Linux kernel CVE team has assigned CVE-2022-50438 to this issue.
Affected and fixed versions
===========================
Issue introduced in 5.10 with commit 5215e16244ee5889cc6135381acdbf4cbcb7905a and fixed in 5.10.153 with commit bb01910763f935b16538084b4269696e0de17f79
Issue introduced in 5.10 with commit 5215e16244ee5889cc6135381acdbf4cbcb7905a and fixed in 5.15.77 with commit e6765fe8de372a84f8dbe9e03ec13c7c70f946b8
Issue introduced in 5.10 with commit 5215e16244ee5889cc6135381acdbf4cbcb7905a and fixed in 6.0.7 with commit ee98ab337036c983239aa550850861c88a5c4262
Issue introduced in 5.10 with commit 5215e16244ee5889cc6135381acdbf4cbcb7905a and fixed in 6.1 with commit 4c1f602df8956bc0decdafd7e4fc7eef50c550b1
Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
older supported kernel versions. The official CVE entry at
https://cve.org/CVERecord/?id=CVE-2022-50438
will be updated if fixes are backported, please check that for the most
up to date information about this issue.
Affected files
==============
The file(s) affected by this issue are:
drivers/net/ethernet/huawei/hinic/hinic_debugfs.c
Mitigation
==========
The Linux kernel CVE team recommends that you update to the latest
stable kernel version for this, and many other bugfixes. Individual
changes are never tested alone, but rather are part of a larger kernel
release. Cherry-picking individual commits is not recommended or
supported by the Linux kernel community at all. If however, updating to
the latest release is impossible, the individual changes to resolve this
issue can be found at these commits:
https://git.kernel.org/stable/c/bb01910763f935b16538084b4269696e0de17f79
https://git.kernel.org/stable/c/e6765fe8de372a84f8dbe9e03ec13c7c70f946b8
https://git.kernel.org/stable/c/ee98ab337036c983239aa550850861c88a5c4262
https://git.kernel.org/stable/c/4c1f602df8956bc0decdafd7e4fc7eef50c550b1
Powered by blists - more mailing lists