{"id":"CVE-2022-50134","summary":"RDMA/hfi1: fix potential memory leak in setup_base_ctxt()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/hfi1: fix potential memory leak in setup_base_ctxt()\n\nsetup_base_ctxt() allocates a memory chunk for uctxt-\u003egroups with\nhfi1_alloc_ctxt_rcv_groups(). When init_user_ctxt() fails, uctxt-\u003egroups\nis not released, which will lead to a memory leak.\n\nWe should release the uctxt-\u003egroups with hfi1_free_ctxt_rcv_groups()\nwhen init_user_ctxt() fails.","modified":"2026-04-11T12:44:54.713509Z","published":"2025-06-18T11:02:58.820Z","related":["SUSE-SU-2025:02264-1","SUSE-SU-2025:02321-1","SUSE-SU-2025:02322-1","SUSE-SU-2025:02334-1","SUSE-SU-2025:02537-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50134.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/1750be1e9f18787cf717c24dbc5fa029fc372a22"},{"type":"WEB","url":"https://git.kernel.org/stable/c/2f90813f1c21c3d780585390af961bd17c8515ae"},{"type":"WEB","url":"https://git.kernel.org/stable/c/90ef48a718f88935d4af53d7dadd1ceafe103ce6"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a85c7dd1edadcdeca24e603a6618153a3bcc81ca"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a9055dfe437efae77e28e57205437c878a03ccb7"},{"type":"WEB","url":"https://git.kernel.org/stable/c/aa2a1df3a2c85f855af7d54466ac10bd48645d63"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e25b828553aecb3185a8d8d0c4f9b4e133fb5db6"},{"type":"WEB","url":"https://git.kernel.org/stable/c/fc4de8009fd6c2ca51986c6757efa964040e7d02"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50134.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50134"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"e87473bc1b6c2cb08f1b760cfc8cd012822241a6"},{"fixed":"fc4de8009fd6c2ca51986c6757efa964040e7d02"},{"fixed":"90ef48a718f88935d4af53d7dadd1ceafe103ce6"},{"fixed":"2f90813f1c21c3d780585390af961bd17c8515ae"},{"fixed":"a85c7dd1edadcdeca24e603a6618153a3bcc81ca"},{"fixed":"e25b828553aecb3185a8d8d0c4f9b4e133fb5db6"},{"fixed":"1750be1e9f18787cf717c24dbc5fa029fc372a22"},{"fixed":"a9055dfe437efae77e28e57205437c878a03ccb7"},{"fixed":"aa2a1df3a2c85f855af7d54466ac10bd48645d63"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50134.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"4.14.0"},{"fixed":"4.14.291"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.15.0"},{"fixed":"4.19.256"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.20.0"},{"fixed":"5.4.211"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.5.0"},{"fixed":"5.10.137"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.61"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"5.18.18"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.19.0"},{"fixed":"5.19.2"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50134.json"}}],"schema_version":"1.7.5"}