First published: Wed Feb 26 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: rtw88: fix memory overrun and memory leak during hw_scan Previously we allocated less memory than actual required, overwrite to the buffer causes the mm module to complaint and raise access violation faults. Along with potential memory leaks when returned early. Fix these by passing the correct size and proper deinit flow.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | ||
Linux Kernel | >=5.17<5.17.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-49231 is classified as a medium severity vulnerability due to potential memory overrun and memory leak issues.
To fix CVE-2022-49231, update the Linux kernel to version 5.17.2 or later where the vulnerability has been addressed.
CVE-2022-49231 affects the Linux kernel versions between 5.17 and 5.17.2.
The impact of CVE-2022-49231 could lead to access violation faults, potentially allowing unauthorized access to system resources.
CVE-2022-49231 was disclosed as part of security updates in the Linux kernel, with the specific fix made available in early 2022.