CVE-2022-49956

Source
https://cve.org/CVERecord?id=CVE-2022-49956
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-49956.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-49956
Downstream
Related
Published
2025-06-18T11:00:18.341Z
Modified
2026-04-03T13:14:49.427478046Z
Summary
staging: rtl8712: fix use after free bugs
Details

In the Linux kernel, the following vulnerability has been resolved:

staging: rtl8712: fix use after free bugs

Read/WriteMACREG callbacks are NULL so the read/writemacreghdl() functions don't do anything except free the "pcmd" pointer. It results in a use after free. Delete them.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49956.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
2865d42c78a9121caad52cb02d1fbb7f5cdbc4ef
Fixed
7dce6b0ee7d78667d6c831ced957a08769973063
Fixed
376e15487fec837301d888068a3fcc82efb6171a
Fixed
9fd6170c5e2d0ccd027abe26f6f5ffc528e1bb27
Fixed
d0aac7146e96bf39e79c65087d21dfa02ef8db38
Fixed
19e3f69d19801940abc2ac37c169882769ed9770
Fixed
dc02aaf950015850e7589696521c7fca767cea77
Fixed
b1727def850904e4b8ba384043775672841663a1
Fixed
e230a4455ac3e9b112f0367d1b8e255e141afae0

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-49956.json"