CVE-2022-49331

Source
https://cve.org/CVERecord?id=CVE-2022-49331
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49331.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49331
Downstream
Related
Published
2025-02-26T02:10:51.040Z
Modified
2026-03-20T12:22:21.549525Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
nfc: st21nfca: fix memory leaks in EVT_TRANSACTION handling
Details

In the Linux kernel, the following vulnerability has been resolved:

nfc: st21nfca: fix memory leaks in EVT_TRANSACTION handling

Error paths do not free previously allocated memory. Add devm_kfree() to those failure paths.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49331.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
26fc6c7f02cb26c39c4733de3dbc3c0646fc1074
Fixed
593773088d615a46a42c97e01a0550d192bb7f74
Fixed
d221ce54ce331c1a23be71eebf57f6a088632383
Fixed
6fce324b530dd74750ad870699e33eeed1029ded
Fixed
3eca2c42daa4659965db6817479027cbc6df7899
Fixed
54423649bc0ed464b75807a7cf2857a5871f738f
Fixed
f444ecd3f57f4ba5090fe8b6756933e37de4226e
Fixed
db836b97464d44340b568e041fd24602858713f7
Fixed
55904086041ba4ee4070187b36590f8f8d6df4cd
Fixed
996419e0594abb311fb958553809f24f38e7abbe

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49331.json"