CVE-2022-49817

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-49817
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-49817.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-49817
Downstream
Published
2025-05-01T14:09:40Z
Modified
2025-10-21T11:15:23.844561Z
Summary
net: mhi: Fix memory leak in mhi_net_dellink()
Details

In the Linux kernel, the following vulnerability has been resolved:

net: mhi: Fix memory leak in mhinetdellink()

MHI driver registers network device without setting the needsfreenetdev flag, and does NOT call free_netdev() when unregisters network device, which causes a memory leak.

This patch calls freenetdev() to fix it since netdevpriv is used after unregister.

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
13adac032982c61bb590669e8e87e51558917ca1
Fixed
88da008e5e2f9753726ea5a51ef2eb144e9de927
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
13adac032982c61bb590669e8e87e51558917ca1
Fixed
25a270343b0f16e1f6e65f541a15975a35e238ff
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
13adac032982c61bb590669e8e87e51558917ca1
Fixed
f7c125bd79f50ec6094761090be81d02726ec6f4

Affected versions

v5.*

v5.13
v5.13-rc4
v5.13-rc5
v5.13-rc6
v5.13-rc7
v5.14
v5.14-rc1
v5.14-rc2
v5.14-rc3
v5.14-rc4
v5.14-rc5
v5.14-rc6
v5.14-rc7
v5.15
v5.15-rc1
v5.15-rc2
v5.15-rc3
v5.15-rc4
v5.15-rc5
v5.15-rc6
v5.15-rc7
v5.15.1
v5.15.10
v5.15.11
v5.15.12
v5.15.13
v5.15.14
v5.15.15
v5.15.16
v5.15.17
v5.15.18
v5.15.19
v5.15.2
v5.15.20
v5.15.21
v5.15.22
v5.15.23
v5.15.24
v5.15.25
v5.15.26
v5.15.27
v5.15.28
v5.15.29
v5.15.3
v5.15.30
v5.15.31
v5.15.32
v5.15.33
v5.15.34
v5.15.35
v5.15.36
v5.15.37
v5.15.38
v5.15.39
v5.15.4
v5.15.40
v5.15.41
v5.15.42
v5.15.43
v5.15.44
v5.15.45
v5.15.46
v5.15.47
v5.15.48
v5.15.49
v5.15.5
v5.15.50
v5.15.51
v5.15.52
v5.15.53
v5.15.54
v5.15.55
v5.15.56
v5.15.57
v5.15.58
v5.15.59
v5.15.6
v5.15.60
v5.15.61
v5.15.62
v5.15.63
v5.15.64
v5.15.65
v5.15.66
v5.15.67
v5.15.68
v5.15.69
v5.15.7
v5.15.70
v5.15.71
v5.15.72
v5.15.73
v5.15.74
v5.15.75
v5.15.76
v5.15.77
v5.15.78
v5.15.79
v5.15.8
v5.15.9
v5.16
v5.16-rc1
v5.16-rc2
v5.16-rc3
v5.16-rc4
v5.16-rc5
v5.16-rc6
v5.16-rc7
v5.16-rc8
v5.17
v5.17-rc1
v5.17-rc2
v5.17-rc3
v5.17-rc4
v5.17-rc5
v5.17-rc6
v5.17-rc7
v5.17-rc8
v5.18
v5.18-rc1
v5.18-rc2
v5.18-rc3
v5.18-rc4
v5.18-rc5
v5.18-rc6
v5.18-rc7
v5.19
v5.19-rc1
v5.19-rc2
v5.19-rc3
v5.19-rc4
v5.19-rc5
v5.19-rc6
v5.19-rc7
v5.19-rc8

v6.*

v6.0
v6.0-rc1
v6.0-rc2
v6.0-rc3
v6.0-rc4
v6.0-rc5
v6.0-rc6
v6.0-rc7
v6.0.1
v6.0.2
v6.0.3
v6.0.4
v6.0.5
v6.0.6
v6.0.7
v6.0.8
v6.0.9
v6.1-rc1
v6.1-rc2
v6.1-rc3
v6.1-rc4

Database specific

vanir_signatures

[
    {
        "deprecated": false,
        "signature_version": "v1",
        "digest": {
            "function_hash": "303921666617766173223345307938951844606",
            "length": 207.0
        },
        "target": {
            "function": "mhi_net_dellink",
            "file": "drivers/net/mhi_net.c"
        },
        "id": "CVE-2022-49817-275ae18c",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f7c125bd79f50ec6094761090be81d02726ec6f4",
        "signature_type": "Function"
    },
    {
        "deprecated": false,
        "signature_version": "v1",
        "digest": {
            "function_hash": "303921666617766173223345307938951844606",
            "length": 207.0
        },
        "target": {
            "function": "mhi_net_dellink",
            "file": "drivers/net/mhi_net.c"
        },
        "id": "CVE-2022-49817-34b01529",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@88da008e5e2f9753726ea5a51ef2eb144e9de927",
        "signature_type": "Function"
    },
    {
        "deprecated": false,
        "signature_version": "v1",
        "digest": {
            "line_hashes": [
                "5559262351234716832773041009247348058",
                "165634551284173126476426412138795759667",
                "313658509300031254874610066516274273823"
            ],
            "threshold": 0.9
        },
        "target": {
            "file": "drivers/net/mhi_net.c"
        },
        "id": "CVE-2022-49817-3cf5b0a5",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f7c125bd79f50ec6094761090be81d02726ec6f4",
        "signature_type": "Line"
    },
    {
        "deprecated": false,
        "signature_version": "v1",
        "digest": {
            "function_hash": "303921666617766173223345307938951844606",
            "length": 207.0
        },
        "target": {
            "function": "mhi_net_dellink",
            "file": "drivers/net/mhi_net.c"
        },
        "id": "CVE-2022-49817-50a4d5dc",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@25a270343b0f16e1f6e65f541a15975a35e238ff",
        "signature_type": "Function"
    },
    {
        "deprecated": false,
        "signature_version": "v1",
        "digest": {
            "line_hashes": [
                "5559262351234716832773041009247348058",
                "165634551284173126476426412138795759667",
                "313658509300031254874610066516274273823"
            ],
            "threshold": 0.9
        },
        "target": {
            "file": "drivers/net/mhi_net.c"
        },
        "id": "CVE-2022-49817-62dd1471",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@88da008e5e2f9753726ea5a51ef2eb144e9de927",
        "signature_type": "Line"
    },
    {
        "deprecated": false,
        "signature_version": "v1",
        "digest": {
            "line_hashes": [
                "5559262351234716832773041009247348058",
                "165634551284173126476426412138795759667",
                "313658509300031254874610066516274273823"
            ],
            "threshold": 0.9
        },
        "target": {
            "file": "drivers/net/mhi_net.c"
        },
        "id": "CVE-2022-49817-b74b28c9",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@25a270343b0f16e1f6e65f541a15975a35e238ff",
        "signature_type": "Line"
    }
]

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.14.0
Fixed
5.15.80
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.0.10