In the Linux kernel, the following vulnerability has been resolved:
amt: fix memory leak for advertisement message
When a gateway receives an advertisement message, it extracts relay information and then it should be freed. But the advertisement handler doesn't free it. So, memory leak would occur.
[
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e7322da399fb86a2072f008b56f7160afa1b2051",
"target": {
"file": "drivers/net/amt.c"
},
"digest": {
"line_hashes": [
"106078167564613226845992581493556743453",
"147277747171874486733663086645485460150",
"92026798755106503599046403763846351565",
"333524308589830825090699284812132700408",
"174410797052370291828604776794876642193",
"115974806107790885178092206064291049404"
],
"threshold": 0.9
},
"deprecated": false,
"id": "CVE-2022-49461-2026fac0",
"signature_version": "v1",
"signature_type": "Line"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@fe29794c3585d039fefebaa2b5a4932a627ad4fd",
"target": {
"function": "amt_rcv",
"file": "drivers/net/amt.c"
},
"digest": {
"function_hash": "277948216773706633832190472538343673490",
"length": 1636.0
},
"deprecated": false,
"id": "CVE-2022-49461-6a2396c5",
"signature_version": "v1",
"signature_type": "Function"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e7322da399fb86a2072f008b56f7160afa1b2051",
"target": {
"function": "amt_rcv",
"file": "drivers/net/amt.c"
},
"digest": {
"function_hash": "277948216773706633832190472538343673490",
"length": 1636.0
},
"deprecated": false,
"id": "CVE-2022-49461-6b323a5e",
"signature_version": "v1",
"signature_type": "Function"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@19bb2d57eac86a368839a92117d8a10ab7183623",
"target": {
"file": "drivers/net/amt.c"
},
"digest": {
"line_hashes": [
"106078167564613226845992581493556743453",
"147277747171874486733663086645485460150",
"92026798755106503599046403763846351565",
"333524308589830825090699284812132700408",
"174410797052370291828604776794876642193",
"115974806107790885178092206064291049404"
],
"threshold": 0.9
},
"deprecated": false,
"id": "CVE-2022-49461-bd7d2e78",
"signature_version": "v1",
"signature_type": "Line"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@19bb2d57eac86a368839a92117d8a10ab7183623",
"target": {
"function": "amt_rcv",
"file": "drivers/net/amt.c"
},
"digest": {
"function_hash": "277948216773706633832190472538343673490",
"length": 1636.0
},
"deprecated": false,
"id": "CVE-2022-49461-c1add9e6",
"signature_version": "v1",
"signature_type": "Function"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@fe29794c3585d039fefebaa2b5a4932a627ad4fd",
"target": {
"file": "drivers/net/amt.c"
},
"digest": {
"line_hashes": [
"106078167564613226845992581493556743453",
"147277747171874486733663086645485460150",
"92026798755106503599046403763846351565",
"333524308589830825090699284812132700408",
"174410797052370291828604776794876642193",
"115974806107790885178092206064291049404"
],
"threshold": 0.9
},
"deprecated": false,
"id": "CVE-2022-49461-f3e1d903",
"signature_version": "v1",
"signature_type": "Line"
}
]