CVE-2022-49105

Source
https://cve.org/CVERecord?id=CVE-2022-49105
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49105.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49105
Downstream
Related
Published
2025-02-26T01:54:53.509Z
Modified
2026-04-11T12:43:34.006205Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
staging: wfx: fix an error handling in wfx_init_common()
Details

In the Linux kernel, the following vulnerability has been resolved:

staging: wfx: fix an error handling in wfxinitcommon()

One error handler of wfxinitcommon() return without calling ieee80211freehw(hw), which may result in memory leak. And I add one err label to unify the error handler, which is useful for the subsequent changes.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49105.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
a7a91ca5a23dbcc68f04d18ef7e765b1e4f64c7f
Fixed
93498c6e775ae91732a8109dba1bdcd324908f84
Fixed
86efcb524ae1889ae73f2a2f0bb7fff2ec757ab0
Fixed
ab0fed1fa744173433cfd1dbaf9239f200ded650
Fixed
9727912e906762a63c1a667c84731d3427653f88
Fixed
60f1d3c92dc1ef1026e5b917a329a7fa947da036

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49105.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.111
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.34
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
5.16.20
Type
ECOSYSTEM
Events
Introduced
5.17.0
Fixed
5.17.3

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49105.json"