In the Linux kernel, the following vulnerability has been resolved:
wifi: ath11k: mhi: fix potential memory leak in ath11kmhiregister()
mhialloccontroller() allocates a memory space for mhictrl. When gets some error, mhictrl should be freed with mhifreecontroller(). But when ath11kmhireadaddrfromdt() fails, the function returns without calling mhifree_controller(), which will lead to a memory leak.
We can fix it by calling mhifreecontroller() when ath11kmhireadaddrfrom_dt() fails.
{
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50418.json",
"cna_assigner": "Linux"
}[
{
"target": {
"file": "drivers/net/wireless/ath/ath11k/mhi.c"
},
"id": "CVE-2022-50418-123bb8f9",
"digest": {
"line_hashes": [
"260416198636941795815282340347860052292",
"156539362931344447635343342638850515720",
"106483589717622227755822845328824427858",
"175163531336222655881231493829585340732",
"114537446240299745941321211689998815950",
"44724885755273069111091560961551511001",
"88361908988103440842272218743061720825",
"72230664126936719576343742248554481025",
"178218772374484665699695462795420987954",
"182369064836635819347226135686504982342",
"142101384879397799136789489311233135486",
"121790901014122956330817130265744931742",
"324824385178394815106098721872445306339",
"146145348766738474545750314458750740937",
"303435242591687604861450165621517296236",
"131220674028301129459888129149921056453",
"245322266917541155731710808660944132308",
"178112927759741020046311176258949352426",
"336817579218577128887325053907738305573",
"52679289906913760892833483748799127539",
"164211086675451460889995268275505564825",
"99099485498147974353465821841583187904"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@43e7c3505ec70db3d3c6458824d5fa40f62e3e7b",
"signature_version": "v1",
"deprecated": false,
"signature_type": "Line"
},
{
"target": {
"file": "drivers/net/wireless/ath/ath11k/mhi.c"
},
"id": "CVE-2022-50418-4b77fec7",
"digest": {
"line_hashes": [
"260416198636941795815282340347860052292",
"156539362931344447635343342638850515720",
"106483589717622227755822845328824427858",
"175163531336222655881231493829585340732",
"114537446240299745941321211689998815950",
"44724885755273069111091560961551511001",
"88361908988103440842272218743061720825",
"72230664126936719576343742248554481025",
"178218772374484665699695462795420987954",
"182369064836635819347226135686504982342",
"142101384879397799136789489311233135486",
"121790901014122956330817130265744931742",
"324824385178394815106098721872445306339",
"146145348766738474545750314458750740937",
"303435242591687604861450165621517296236",
"131220674028301129459888129149921056453",
"245322266917541155731710808660944132308",
"178112927759741020046311176258949352426",
"336817579218577128887325053907738305573",
"52679289906913760892833483748799127539",
"164211086675451460889995268275505564825",
"99099485498147974353465821841583187904"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@015ced9eb63b8b19cb725a1d592d150b60494ced",
"signature_version": "v1",
"deprecated": false,
"signature_type": "Line"
},
{
"target": {
"function": "ath11k_mhi_register",
"file": "drivers/net/wireless/ath/ath11k/mhi.c"
},
"id": "CVE-2022-50418-acf11263",
"digest": {
"function_hash": "153241198763421409716725161381060842584",
"length": 1723.0
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@43e7c3505ec70db3d3c6458824d5fa40f62e3e7b",
"signature_version": "v1",
"deprecated": false,
"signature_type": "Function"
},
{
"target": {
"function": "ath11k_mhi_register",
"file": "drivers/net/wireless/ath/ath11k/mhi.c"
},
"id": "CVE-2022-50418-f53bfa66",
"digest": {
"function_hash": "153241198763421409716725161381060842584",
"length": 1723.0
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@015ced9eb63b8b19cb725a1d592d150b60494ced",
"signature_version": "v1",
"deprecated": false,
"signature_type": "Function"
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50418.json"