-

CVE-2022-50418

In the Linux kernel, the following vulnerability has been resolved:

wifi: ath11k: mhi: fix potential memory leak in ath11k_mhi_register()

mhi_alloc_controller() allocates a memory space for mhi_ctrl. When gets
some error, mhi_ctrl should be freed with mhi_free_controller(). But
when ath11k_mhi_read_addr_from_dt() fails, the function returns without
calling mhi_free_controller(), which will lead to a memory leak.

We can fix it by calling mhi_free_controller() when
ath11k_mhi_read_addr_from_dt() fails.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < 72ef896e80b6ec7cdc1dd42577045f8e7c9c32b3
Version d5c65159f2895379e11ca13f62feabe93278985d
Status affected
Version < 015ced9eb63b8b19cb725a1d592d150b60494ced
Version d5c65159f2895379e11ca13f62feabe93278985d
Status affected
Version < 43e7c3505ec70db3d3c6458824d5fa40f62e3e7b
Version d5c65159f2895379e11ca13f62feabe93278985d
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 5.6
Status affected
Version < 5.6
Version 0
Status unaffected
Version <= 5.19.*
Version 5.19.17
Status unaffected
Version <= 6.0.*
Version 6.0.3
Status unaffected
Version <= *
Version 6.1
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.02% 0.042
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string