In the Linux kernel, the following vulnerability has been resolved:
ath11k: add missing ofnodeput() to avoid leak
The node pointer is returned by offindnodebytype() or ofparsephandle() with refcount incremented. Calling ofnodeput() to aovid the refcount leak.
[
{
"signature_type": "Function",
"deprecated": false,
"target": {
"file": "drivers/net/wireless/ath/ath11k/mhi.c",
"function": "ath11k_mhi_read_addr_from_dt"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3d38faef0de1756994b3d95e47b2302842f729e2",
"digest": {
"length": 302.0,
"function_hash": "157483012207172962223958573293552383831"
},
"id": "CVE-2022-49237-3b863e11"
},
{
"signature_type": "Line",
"deprecated": false,
"target": {
"file": "drivers/net/wireless/ath/ath11k/mhi.c"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7d51cb010b20d70b16dc6e4341bf29d6c5b32564",
"digest": {
"line_hashes": [
"41273946281286173310745962366940889413",
"122377948580743616731179899204304438613",
"298699894924225192820034245010547052746",
"68775265877901301849475110000887256219"
],
"threshold": 0.9
},
"id": "CVE-2022-49237-5891a0db"
},
{
"signature_type": "Line",
"deprecated": false,
"target": {
"file": "drivers/net/wireless/ath/ath11k/qmi.c"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7d51cb010b20d70b16dc6e4341bf29d6c5b32564",
"digest": {
"line_hashes": [
"318005316855077299637157972391485446392",
"280483029983675224697410507228538049446",
"333727637710457105089378180180565150796",
"280800540603084396922239857814123024816"
],
"threshold": 0.9
},
"id": "CVE-2022-49237-643d2781"
},
{
"signature_type": "Function",
"deprecated": false,
"target": {
"file": "drivers/net/wireless/ath/ath11k/qmi.c",
"function": "ath11k_qmi_assign_target_mem_chunk"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7d51cb010b20d70b16dc6e4341bf29d6c5b32564",
"digest": {
"length": 2592.0,
"function_hash": "43939228757095978519511999160757676610"
},
"id": "CVE-2022-49237-7aa4c2d8"
},
{
"signature_type": "Line",
"deprecated": false,
"target": {
"file": "drivers/net/wireless/ath/ath11k/mhi.c"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3d38faef0de1756994b3d95e47b2302842f729e2",
"digest": {
"line_hashes": [
"41273946281286173310745962366940889413",
"122377948580743616731179899204304438613",
"298699894924225192820034245010547052746",
"68775265877901301849475110000887256219"
],
"threshold": 0.9
},
"id": "CVE-2022-49237-877829fb"
},
{
"signature_type": "Function",
"deprecated": false,
"target": {
"file": "drivers/net/wireless/ath/ath11k/qmi.c",
"function": "ath11k_qmi_assign_target_mem_chunk"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3d38faef0de1756994b3d95e47b2302842f729e2",
"digest": {
"length": 2592.0,
"function_hash": "43939228757095978519511999160757676610"
},
"id": "CVE-2022-49237-b776739f"
},
{
"signature_type": "Line",
"deprecated": false,
"target": {
"file": "drivers/net/wireless/ath/ath11k/qmi.c"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3d38faef0de1756994b3d95e47b2302842f729e2",
"digest": {
"line_hashes": [
"318005316855077299637157972391485446392",
"280483029983675224697410507228538049446",
"333727637710457105089378180180565150796",
"280800540603084396922239857814123024816"
],
"threshold": 0.9
},
"id": "CVE-2022-49237-cb94b79f"
},
{
"signature_type": "Function",
"deprecated": false,
"target": {
"file": "drivers/net/wireless/ath/ath11k/mhi.c",
"function": "ath11k_mhi_read_addr_from_dt"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7d51cb010b20d70b16dc6e4341bf29d6c5b32564",
"digest": {
"length": 302.0,
"function_hash": "157483012207172962223958573293552383831"
},
"id": "CVE-2022-49237-e385d35b"
}
]