In the Linux kernel, the following vulnerability has been resolved: selinux: fix memleak in security_read_state_kernel() In this function, it directly returns the result of __security_read_policy without freeing the allocated memory in *data, cause memory leak issue, so free the memory if __security_read_policy failed. [PM: subject line tweak]
Upstream advisory: https://lore.kernel.org/linux-cve-announce/2025061840-CVE-2022-50201-7b57@gregkh/T