CVE-2022-49105

Source
https://cve.org/CVERecord?id=CVE-2022-49105
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49105.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49105
Downstream
Related
Published
2025-02-26T01:54:53.509Z
Modified
2026-03-12T03:24:35.408361Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
staging: wfx: fix an error handling in wfx_init_common()
Details

In the Linux kernel, the following vulnerability has been resolved:

staging: wfx: fix an error handling in wfxinitcommon()

One error handler of wfxinitcommon() return without calling ieee80211freehw(hw), which may result in memory leak. And I add one err label to unify the error handler, which is useful for the subsequent changes.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49105.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
a7a91ca5a23dbcc68f04d18ef7e765b1e4f64c7f
Fixed
93498c6e775ae91732a8109dba1bdcd324908f84
Fixed
86efcb524ae1889ae73f2a2f0bb7fff2ec757ab0
Fixed
ab0fed1fa744173433cfd1dbaf9239f200ded650
Fixed
9727912e906762a63c1a667c84731d3427653f88
Fixed
60f1d3c92dc1ef1026e5b917a329a7fa947da036

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49105.json"