In the Linux kernel, the following vulnerability has been resolved:
net: wwan: iosm: fix memory leak in ipcwwandellink
IOSM driver registers network device without setting the needsfreenetdev flag, and does NOT call free_netdev() when unregisters network device, which causes a memory leak.
This patch sets needsfreenetdev to true when registers network device, which makes netdev subsystem call freenetdev() automatically after unregisternetdevice().
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49867.json"
}"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-49867.json"
[
{
"signature_version": "v1",
"target": {
"file": "drivers/net/wwan/iosm/iosm_ipc_wwan.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2ce2348c2858d723f7fe389dead9b43b08e0944e",
"deprecated": false,
"digest": {
"line_hashes": [
"244602207013427709758720115633020986167",
"103447924927678053029498533003072232984",
"229467141628910847161736658388482353205",
"172481985060416975846583638120049271533"
],
"threshold": 0.9
},
"id": "CVE-2022-49867-0b8e6861",
"signature_type": "Line"
},
{
"signature_version": "v1",
"target": {
"file": "drivers/net/wwan/iosm/iosm_ipc_wwan.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@128514b51a5ba2c82f9e4a106f1c10423907618a",
"deprecated": false,
"digest": {
"line_hashes": [
"244602207013427709758720115633020986167",
"103447924927678053029498533003072232984",
"229467141628910847161736658388482353205",
"172481985060416975846583638120049271533"
],
"threshold": 0.9
},
"id": "CVE-2022-49867-0fc5fe70",
"signature_type": "Line"
},
{
"signature_version": "v1",
"target": {
"file": "drivers/net/wwan/iosm/iosm_ipc_wwan.c",
"function": "ipc_wwan_setup"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f25caaca424703d5a0607310f0452f978f1f78d9",
"deprecated": false,
"digest": {
"function_hash": "304447458837814716704252742249371023311",
"length": 361.0
},
"id": "CVE-2022-49867-2a2b9ec6",
"signature_type": "Function"
},
{
"signature_version": "v1",
"target": {
"file": "drivers/net/wwan/iosm/iosm_ipc_wwan.c",
"function": "ipc_wwan_setup"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@128514b51a5ba2c82f9e4a106f1c10423907618a",
"deprecated": false,
"digest": {
"function_hash": "304447458837814716704252742249371023311",
"length": 361.0
},
"id": "CVE-2022-49867-69f659c5",
"signature_type": "Function"
},
{
"signature_version": "v1",
"target": {
"file": "drivers/net/wwan/iosm/iosm_ipc_wwan.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f25caaca424703d5a0607310f0452f978f1f78d9",
"deprecated": false,
"digest": {
"line_hashes": [
"244602207013427709758720115633020986167",
"103447924927678053029498533003072232984",
"229467141628910847161736658388482353205",
"172481985060416975846583638120049271533"
],
"threshold": 0.9
},
"id": "CVE-2022-49867-9f45da3d",
"signature_type": "Line"
},
{
"signature_version": "v1",
"target": {
"file": "drivers/net/wwan/iosm/iosm_ipc_wwan.c",
"function": "ipc_wwan_setup"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2ce2348c2858d723f7fe389dead9b43b08e0944e",
"deprecated": false,
"digest": {
"function_hash": "216495229857356140607549979684581576749",
"length": 352.0
},
"id": "CVE-2022-49867-a26a6259",
"signature_type": "Function"
}
]