0.0
NA
CVE-2022-50758
staging: vt6655: fix potential memory leak
Description

In the Linux kernel, the following vulnerability has been resolved: staging: vt6655: fix potential memory leak In function device_init_td0_ring, memory is allocated for member td_info of priv->apTD0Rings[i], with i increasing from 0. In case of allocation failure, the memory is freed in reversed order, with i decreasing to 0. However, the case i=0 is left out and thus memory is leaked. Modify the memory freeing loop to include the case i=0.

INFO

Published Date :

Dec. 24, 2025, 1:16 p.m.

Last Modified :

Dec. 24, 2025, 1:16 p.m.

Remotely Exploit :

No

Source :

416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Products

The following products are affected by CVE-2022-50758 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

No affected product recoded yet

Solution
Fix memory leak in Linux kernel's vt6655 driver by ensuring all allocated memory is freed.
  • Update the Linux kernel to the latest version.
  • Apply the patch for staging: vt6655: fix potential memory leak.
  • Verify memory freeing logic in device_init_td0_ring.
  • Ensure i=0 case is handled in memory deallocation.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2022-50758 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2022-50758 weaknesses.

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2022-50758 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2022-50758 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • New CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67

    Dec. 24, 2025

    Action Type Old Value New Value
    Added Description In the Linux kernel, the following vulnerability has been resolved: staging: vt6655: fix potential memory leak In function device_init_td0_ring, memory is allocated for member td_info of priv->apTD0Rings[i], with i increasing from 0. In case of allocation failure, the memory is freed in reversed order, with i decreasing to 0. However, the case i=0 is left out and thus memory is leaked. Modify the memory freeing loop to include the case i=0.
    Added Reference https://git.kernel.org/stable/c/16a45e78a687eb6c69acc4e62b94b6508b0bfbda
    Added Reference https://git.kernel.org/stable/c/1b3cebeca99e8e0aa4fa57faac8dbf41e967317a
    Added Reference https://git.kernel.org/stable/c/c8ff91535880d41b49699b3829fb6151942de29e
    Added Reference https://git.kernel.org/stable/c/cfdf139258614ef65b0f68b857ada5328fb7c0e5
    Added Reference https://git.kernel.org/stable/c/e741e38aa98704fbb959650ecd270b71b2670680
    Added Reference https://git.kernel.org/stable/c/fb5f569bcda8f87bd47d8030bfae343d757fa3ea
    Added Reference https://git.kernel.org/stable/c/ff8551d411f12b5abc5ca929ab87643afa8a9588
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
Vulnerability Scoring Details
No CVSS metrics available for this vulnerability.