CVE-2022-50288
15.09.2025, 15:15
In the Linux kernel, the following vulnerability has been resolved: qlcnic: prevent ->dcb use-after-free on qlcnic_dcb_enable() failure adapter->dcb would get silently freed inside qlcnic_dcb_enable() in case qlcnic_dcb_attach() would return an error, which always happens under OOM conditions. This would lead to use-after-free because both of the existing callers invoke qlcnic_dcb_get_info() on the obtained pointer, which is potentially freed at that point. Propagate errors from qlcnic_dcb_enable(), and instead free the dcb pointer at callsite using qlcnic_dcb_free(). This also removes the now unused qlcnic_clear_dcb_ops() helper, which was a simple wrapper around kfree() also causing memory leaks for partially initialized dcb. Found by Linux Verification Center (linuxtesting.org) with the SVACE static analysis tool.Enginsight
| Vendor | Product | Version |
|---|---|---|
| linux | linux_kernel | 3.14 ≤ 𝑥 < 4.14.303 |
| linux | linux_kernel | 4.15 ≤ 𝑥 < 4.19.270 |
| linux | linux_kernel | 4.20 ≤ 𝑥 < 5.4.229 |
| linux | linux_kernel | 5.5 ≤ 𝑥 < 5.10.163 |
| linux | linux_kernel | 5.11 ≤ 𝑥 < 5.15.87 |
| linux | linux_kernel | 5.16 ≤ 𝑥 < 6.0.19 |
| linux | linux_kernel | 6.1 ≤ 𝑥 < 6.1.5 |
| linux | linux_kernel | 6.2:rc1 |
| linux | linux_kernel | 6.2:rc2 |
𝑥
= Vulnerable software versions
Debian Releases
Common Weakness Enumeration
References