CVE-2022-50201

Source
https://cve.org/CVERecord?id=CVE-2022-50201
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50201.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-50201
Downstream
Related
Published
2025-06-18T11:03:43.263Z
Modified
2026-04-03T13:14:39.565534103Z
Summary
selinux: fix memleak in security_read_state_kernel()
Details

In the Linux kernel, the following vulnerability has been resolved:

selinux: fix memleak in securityreadstate_kernel()

In this function, it directly returns the result of __securityreadpolicy without freeing the allocated memory in *data, cause memory leak issue, so free the memory if __securityreadpolicy failed.

[PM: subject line tweak]

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50201.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
fdd1ffe8a812b1109388e4bc389e57b2695ad095
Fixed
c877c5217145bda8fd95f506bf42f8d981afa57d
Fixed
f3cd7562c0a6774fc62d79654482014020e574f5
Fixed
1fc1f72aad2070d34022d0823e4cf09706b53f25
Fixed
73de1befcc53a7c68b0c5e76b9b5ac41c517760f

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50201.json"