In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: use memset avoid memory leaks
Use memset to initialize structs to prevent memory leaks in l2capecredconnect
[
{
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"75207956293218027141648911576411255743",
"332265880384339332157997097137615164802",
"102174481499501720115409674879780714464"
]
},
"signature_type": "Line",
"id": "CVE-2022-49116-61b3a522",
"target": {
"file": "net/bluetooth/l2cap_core.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9567d54e70ff58c2695c2cc2e53c86c67551d3e6",
"deprecated": false
},
{
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"75207956293218027141648911576411255743",
"332265880384339332157997097137615164802",
"102174481499501720115409674879780714464"
]
},
"signature_type": "Line",
"id": "CVE-2022-49116-6406bdf1",
"target": {
"file": "net/bluetooth/l2cap_core.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d588c183a971b85c775ad66da563ee6e8bc8158f",
"deprecated": false
},
{
"signature_version": "v1",
"digest": {
"length": 881.0,
"function_hash": "180560797148464385031859206891498176858"
},
"signature_type": "Function",
"id": "CVE-2022-49116-6d08e806",
"target": {
"file": "net/bluetooth/l2cap_core.c",
"function": "l2cap_ecred_connect"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d3715b2333e9a21692ba16ef8645eda584a9515d",
"deprecated": false
},
{
"signature_version": "v1",
"digest": {
"length": 881.0,
"function_hash": "180560797148464385031859206891498176858"
},
"signature_type": "Function",
"id": "CVE-2022-49116-799ae26e",
"target": {
"file": "net/bluetooth/l2cap_core.c",
"function": "l2cap_ecred_connect"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d588c183a971b85c775ad66da563ee6e8bc8158f",
"deprecated": false
},
{
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"75207956293218027141648911576411255743",
"332265880384339332157997097137615164802",
"102174481499501720115409674879780714464"
]
},
"signature_type": "Line",
"id": "CVE-2022-49116-898f3ebc",
"target": {
"file": "net/bluetooth/l2cap_core.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d3715b2333e9a21692ba16ef8645eda584a9515d",
"deprecated": false
},
{
"signature_version": "v1",
"digest": {
"length": 881.0,
"function_hash": "180560797148464385031859206891498176858"
},
"signature_type": "Function",
"id": "CVE-2022-49116-8be6f4db",
"target": {
"file": "net/bluetooth/l2cap_core.c",
"function": "l2cap_ecred_connect"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e9e55acee9b7a737ec7f5161b94a78932a5514c8",
"deprecated": false
},
{
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"75207956293218027141648911576411255743",
"332265880384339332157997097137615164802",
"102174481499501720115409674879780714464"
]
},
"signature_type": "Line",
"id": "CVE-2022-49116-9ef86ca3",
"target": {
"file": "net/bluetooth/l2cap_core.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e9e55acee9b7a737ec7f5161b94a78932a5514c8",
"deprecated": false
},
{
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"75207956293218027141648911576411255743",
"332265880384339332157997097137615164802",
"102174481499501720115409674879780714464"
]
},
"signature_type": "Line",
"id": "CVE-2022-49116-b5358f17",
"target": {
"file": "net/bluetooth/l2cap_core.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@42b6a39f439b6f37cc2024d91ce547d83290ff78",
"deprecated": false
},
{
"signature_version": "v1",
"digest": {
"length": 881.0,
"function_hash": "180560797148464385031859206891498176858"
},
"signature_type": "Function",
"id": "CVE-2022-49116-c3a0f6ef",
"target": {
"file": "net/bluetooth/l2cap_core.c",
"function": "l2cap_ecred_connect"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9567d54e70ff58c2695c2cc2e53c86c67551d3e6",
"deprecated": false
},
{
"signature_version": "v1",
"digest": {
"length": 881.0,
"function_hash": "180560797148464385031859206891498176858"
},
"signature_type": "Function",
"id": "CVE-2022-49116-d86cc03c",
"target": {
"file": "net/bluetooth/l2cap_core.c",
"function": "l2cap_ecred_connect"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@42b6a39f439b6f37cc2024d91ce547d83290ff78",
"deprecated": false
}
]