Memory Leak Affecting kernel-rt-64k-debug-kvm package, versions *


Severity

Recommended
0.0
medium
0
10

Based on Red Hat Enterprise Linux security rating.

Threat Intelligence

EPSS
0.01% (2nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Memory Leak vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-RHEL9-KERNELRT64KDEBUGKVM-14073110
  • published20 Nov 2025
  • disclosed18 Jun 2025

Introduced: 18 Jun 2025

CVE-2022-50186  (opens in a new tab)
CWE-401  (opens in a new tab)

How to fix?

There is no fixed version for RHEL:9 kernel-rt-64k-debug-kvm.

NVD Description

Note: Versions mentioned in the description apply only to the upstream kernel-rt-64k-debug-kvm package and not the kernel-rt-64k-debug-kvm package as distributed by RHEL. See How to fix? for RHEL:9 relevant fixed versions and status.

In the Linux kernel, the following vulnerability has been resolved:

ath11k: fix missing skb drop on htc_tx_completion error

On htc_tx_completion error the skb is not dropped. This is wrong since the completion_handler logic expect the skb to be consumed anyway even when an error is triggered. Not freeing the skb on error is a memory leak since the skb won't be freed anywere else. Correctly free the packet on eid >= ATH11K_HTC_EP_COUNT before returning.

Tested-on: IPQ8074 hw2.0 AHB WLAN.HK.2.5.0.1-01208-QCAHKSWPL_SILICONZ-1

CVSS Base Scores

version 3.1