Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: rtw88: fix memory overrun and memory leak during hw_scan Previously we allocated less memory than actual required, overwrite to the buffer causes the mm module to complaint and raise access violation faults. Along with potential memory leaks when returned early. Fix these by passing the correct size and proper deinit flow.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 5.17, < 5.17.2 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/d95984b5580dcb8b1c0036577c52b609990a1dabPatch
- https://git.kernel.org/stable/c/ec5da191bfcd5fd22b95459b623694f66c1cc10bPatch
FAQ
What is CVE-2022-49231?
CVE-2022-49231 is a vulnerability with a CVSS score of 5.5 (MEDIUM). In the Linux kernel, the following vulnerability has been resolved: rtw88: fix memory overrun and memory leak during hw_scan Previously we allocated less memory than actual required, overwrite to th...
How severe is CVE-2022-49231?
CVE-2022-49231 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-49231?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.