In the Linux kernel, the following vulnerability has been resolved:
wifi: cfg80211: fix memory leak in queryregdbfile()
In the function queryregdbfile() the alpha2 parameter is duplicated using kmemdup() and subsequently freed in regdbfwcb(). However, requestfirmwarenowait() can fail without calling regdbfwcb() and thus leak memory.
[
{
"digest": {
"line_hashes": [
"15158440790765029468442319866889736013",
"145315103655553467077877750965261894850",
"33507154489872078222866952586191899998",
"265440229061832394915196948362558452587",
"113149056776608177797680992078915526352",
"296645567860995430095962919220749481082",
"218413130543674512037835101456347795196",
"56406713917728427395473228182178509583",
"289175627522453449738378711809870848875",
"209803535881300080009462227767997663318"
],
"threshold": 0.9
},
"deprecated": false,
"signature_version": "v1",
"signature_type": "Line",
"id": "CVE-2022-49881-192c180b",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@219446396786330937bcd382a7bc4ccd767383bc",
"target": {
"file": "net/wireless/reg.c"
}
},
{
"digest": {
"length": 310.0,
"function_hash": "130787709842595141242616478541586851619"
},
"deprecated": false,
"signature_version": "v1",
"signature_type": "Function",
"id": "CVE-2022-49881-1e8c8c97",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e9b5a4566d5bc71cc901be50d1fa24da00613120",
"target": {
"function": "query_regdb_file",
"file": "net/wireless/reg.c"
}
},
{
"digest": {
"line_hashes": [
"243496662706414460260526691072839800999",
"138808986552820705697224438569827899664",
"33507154489872078222866952586191899998",
"265440229061832394915196948362558452587",
"113149056776608177797680992078915526352",
"296645567860995430095962919220749481082",
"218413130543674512037835101456347795196",
"56406713917728427395473228182178509583",
"289175627522453449738378711809870848875",
"209803535881300080009462227767997663318"
],
"threshold": 0.9
},
"deprecated": false,
"signature_version": "v1",
"signature_type": "Line",
"id": "CVE-2022-49881-202542a8",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@57b962e627ec0ae53d4d16d7bd1033e27e67677a",
"target": {
"file": "net/wireless/reg.c"
}
},
{
"digest": {
"line_hashes": [
"243496662706414460260526691072839800999",
"138808986552820705697224438569827899664",
"33507154489872078222866952586191899998",
"265440229061832394915196948362558452587",
"113149056776608177797680992078915526352",
"296645567860995430095962919220749481082",
"218413130543674512037835101456347795196",
"56406713917728427395473228182178509583",
"289175627522453449738378711809870848875",
"209803535881300080009462227767997663318"
],
"threshold": 0.9
},
"deprecated": false,
"signature_version": "v1",
"signature_type": "Line",
"id": "CVE-2022-49881-6905bcc4",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e9b5a4566d5bc71cc901be50d1fa24da00613120",
"target": {
"file": "net/wireless/reg.c"
}
},
{
"digest": {
"length": 310.0,
"function_hash": "130787709842595141242616478541586851619"
},
"deprecated": false,
"signature_version": "v1",
"signature_type": "Function",
"id": "CVE-2022-49881-a3ae4236",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@57b962e627ec0ae53d4d16d7bd1033e27e67677a",
"target": {
"function": "query_regdb_file",
"file": "net/wireless/reg.c"
}
},
{
"digest": {
"length": 310.0,
"function_hash": "130787709842595141242616478541586851619"
},
"deprecated": false,
"signature_version": "v1",
"signature_type": "Function",
"id": "CVE-2022-49881-bb70c7c1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@219446396786330937bcd382a7bc4ccd767383bc",
"target": {
"function": "query_regdb_file",
"file": "net/wireless/reg.c"
}
},
{
"digest": {
"length": 310.0,
"function_hash": "130787709842595141242616478541586851619"
},
"deprecated": false,
"signature_version": "v1",
"signature_type": "Function",
"id": "CVE-2022-49881-e0c0d8a8",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e1e12180321f416d83444f2cdc9259e0f5093d35",
"target": {
"function": "query_regdb_file",
"file": "net/wireless/reg.c"
}
},
{
"digest": {
"line_hashes": [
"243496662706414460260526691072839800999",
"138808986552820705697224438569827899664",
"33507154489872078222866952586191899998",
"265440229061832394915196948362558452587",
"113149056776608177797680992078915526352",
"296645567860995430095962919220749481082",
"218413130543674512037835101456347795196",
"56406713917728427395473228182178509583",
"289175627522453449738378711809870848875",
"209803535881300080009462227767997663318"
],
"threshold": 0.9
},
"deprecated": false,
"signature_version": "v1",
"signature_type": "Line",
"id": "CVE-2022-49881-f417ca9c",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e1e12180321f416d83444f2cdc9259e0f5093d35",
"target": {
"file": "net/wireless/reg.c"
}
}
]