{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2022-50513","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2025-10-07T15:14:58.492Z","datePublished":"2025-10-07T15:19:09.547Z","dateUpdated":"2026-05-11T19:20:52.983Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T19:20:52.983Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nstaging: rtl8723bs: fix a potential memory leak in rtw_init_cmd_priv()\n\nIn rtw_init_cmd_priv(), if `pcmdpriv->rsp_allocated_buf` is allocated\nin failure, then `pcmdpriv->cmd_allocated_buf` will be not properly\nreleased. Besides, considering there are only two error paths and the\nfirst one can directly return, so we do not need implicitly jump to the\n`exit` tag to execute the error handler.\n\nSo this patch added `kfree(pcmdpriv->cmd_allocated_buf);` on the error\npath to release the resource and simplified the return logic of\nrtw_init_cmd_priv(). As there is no proper device to test with, no runtime\ntesting was performed."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/staging/rtl8723bs/core/rtw_cmd.c"],"versions":[{"version":"554c0a3abf216c991c5ebddcdb2c08689ecd290b","lessThan":"e5d8f05edb36fc4ab15beec62cb6ab62f5a60fe2","status":"affected","versionType":"git"},{"version":"554c0a3abf216c991c5ebddcdb2c08689ecd290b","lessThan":"e6cc39db24a63f68314473621020ed8cad7be423","status":"affected","versionType":"git"},{"version":"554c0a3abf216c991c5ebddcdb2c08689ecd290b","lessThan":"39bef9c6a91bbb790d04c1347cfeae584541fb6a","status":"affected","versionType":"git"},{"version":"554c0a3abf216c991c5ebddcdb2c08689ecd290b","lessThan":"a5be64ff6d21f7805a91e6d81f53fc19cd9f0fae","status":"affected","versionType":"git"},{"version":"554c0a3abf216c991c5ebddcdb2c08689ecd290b","lessThan":"8db6ca84eee0ac258706f3fca54f7c021cb159ef","status":"affected","versionType":"git"},{"version":"554c0a3abf216c991c5ebddcdb2c08689ecd290b","lessThan":"708056fba733a73d926772ea4ce9a42d240345da","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/staging/rtl8723bs/core/rtw_cmd.c"],"versions":[{"version":"4.12","status":"affected"},{"version":"0","lessThan":"4.12","status":"unaffected","versionType":"semver"},{"version":"5.4.220","lessThanOrEqual":"5.4.*","status":"unaffected","versionType":"semver"},{"version":"5.10.150","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.75","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"5.19.17","lessThanOrEqual":"5.19.*","status":"unaffected","versionType":"semver"},{"version":"6.0.3","lessThanOrEqual":"6.0.*","status":"unaffected","versionType":"semver"},{"version":"6.1","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.12","versionEndExcluding":"5.4.220"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.12","versionEndExcluding":"5.10.150"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.12","versionEndExcluding":"5.15.75"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.12","versionEndExcluding":"5.19.17"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.12","versionEndExcluding":"6.0.3"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.12","versionEndExcluding":"6.1"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/e5d8f05edb36fc4ab15beec62cb6ab62f5a60fe2"},{"url":"https://git.kernel.org/stable/c/e6cc39db24a63f68314473621020ed8cad7be423"},{"url":"https://git.kernel.org/stable/c/39bef9c6a91bbb790d04c1347cfeae584541fb6a"},{"url":"https://git.kernel.org/stable/c/a5be64ff6d21f7805a91e6d81f53fc19cd9f0fae"},{"url":"https://git.kernel.org/stable/c/8db6ca84eee0ac258706f3fca54f7c021cb159ef"},{"url":"https://git.kernel.org/stable/c/708056fba733a73d926772ea4ce9a42d240345da"}],"title":"staging: rtl8723bs: fix a potential memory leak in rtw_init_cmd_priv()","x_generator":{"engine":"bippy-1.2.0"}}}}