We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2022-49231

rtw88: fix memory overrun and memory leak during hw_scan



Description

In the Linux kernel, the following vulnerability has been resolved: rtw88: fix memory overrun and memory leak during hw_scan Previously we allocated less memory than actual required, overwrite to the buffer causes the mm module to complaint and raise access violation faults. Along with potential memory leaks when returned early. Fix these by passing the correct size and proper deinit flow.

Reserved 2025-02-26 | Published 2025-02-26 | Updated 2025-02-26 | Assigner Linux

Product status

Default status
unaffected

10d162b2ed395e69720926b4f8d87f1f25ca920f before ec5da191bfcd5fd22b95459b623694f66c1cc10b
affected

10d162b2ed395e69720926b4f8d87f1f25ca920f before d95984b5580dcb8b1c0036577c52b609990a1dab
affected

Default status
affected

5.17
affected

Any version before 5.17
unaffected

5.17.2
unaffected

5.18
unaffected

References

git.kernel.org/...c/ec5da191bfcd5fd22b95459b623694f66c1cc10b

git.kernel.org/...c/d95984b5580dcb8b1c0036577c52b609990a1dab

cve.org (CVE-2022-49231)

nvd.nist.gov (CVE-2022-49231)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2022-49231

Support options

Helpdesk Chat, Email, Knowledgebase
MonTueWedThuFriSatSun
311234567891011121314151617181920212223242526272829301234567891011
MonTueWedThuFriSatSun
311234567891011121314151617181920212223242526272829301234567891011