VYPR
Unrated severityNVD Advisory· Published Dec 24, 2025· Updated Apr 15, 2026

CVE-2022-50758

CVE-2022-50758

Description

In the Linux kernel, the following vulnerability has been resolved:

staging: vt6655: fix potential memory leak

In function device_init_td0_ring, memory is allocated for member td_info of priv->apTD0Rings[i], with i increasing from 0. In case of allocation failure, the memory is freed in reversed order, with i decreasing to 0. However, the case i=0 is left out and thus memory is leaked.

Modify the memory freeing loop to include the case i=0.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A memory leak in the Linux kernel's vt6655 driver occurs when ring buffer allocation fails, because the cleanup loop skips index 0.

Vulnerability

In the Linux kernel's staging vt6655 wireless driver, the function device_init_td0_ring allocates memory for the td_info member of each ring entry priv->apTD0Rings[i] as i increases from 0. If an allocation fails partway through, the cleanup loop frees previously allocated entries in reverse order, but it incorrectly omits the case i=0, leaving that entry's memory allocated and causing a memory leak [1][2][3].

Exploitation

This is a local vulnerability that can be triggered during driver initialization when memory is scarce. An attacker with local access or the ability to exhaust system memory could cause the allocation to fail, leading to the leak. No special privileges beyond the ability to load or initialize the vt6655 driver are required.

Impact

A successful trigger results in a small memory leak each time the driver is initialized under low-memory conditions. Repeated exploitation could exhaust kernel memory, potentially leading to a denial-of-service (DoS) condition on the affected system.

Mitigation

The fix, which modifies the cleanup loop to include i=0, has been applied to the Linux kernel stable tree [1][2][3]. Users should update to a kernel version containing the commit to eliminate the leak.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

7

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

7

News mentions

0

No linked articles in our index yet.