Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2022-49922

Summary
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
Published At-01 May, 2025 | 14:11
Updated At-04 May, 2025 | 08:48
Rejected At-
Credits

nfc: nfcmrvl: Fix potential memory leak in nfcmrvl_i2c_nci_send()

In the Linux kernel, the following vulnerability has been resolved: nfc: nfcmrvl: Fix potential memory leak in nfcmrvl_i2c_nci_send() nfcmrvl_i2c_nci_send() will be called by nfcmrvl_nci_send(), and skb should be freed in nfcmrvl_i2c_nci_send(). However, nfcmrvl_nci_send() will only free skb when i2c_master_send() return >=0, which means skb will memleak when i2c_master_send() failed. Free skb no matter whether i2c_master_send() succeeds.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:Linux
Assigner Org ID:416baaa9-dc9f-4396-8d5f-8c081fb06d67
Published At:01 May, 2025 | 14:11
Updated At:04 May, 2025 | 08:48
Rejected At:
▼CVE Numbering Authority (CNA)
nfc: nfcmrvl: Fix potential memory leak in nfcmrvl_i2c_nci_send()

In the Linux kernel, the following vulnerability has been resolved: nfc: nfcmrvl: Fix potential memory leak in nfcmrvl_i2c_nci_send() nfcmrvl_i2c_nci_send() will be called by nfcmrvl_nci_send(), and skb should be freed in nfcmrvl_i2c_nci_send(). However, nfcmrvl_nci_send() will only free skb when i2c_master_send() return >=0, which means skb will memleak when i2c_master_send() failed. Free skb no matter whether i2c_master_send() succeeds.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/nfc/nfcmrvl/i2c.c
Default Status
unaffected
Versions
Affected
  • From b5b3e23e4cace008e1a30e8614a484d14dfd07a1 before dd0ee55ead91fbb16889dbe7ff0b0f7c9e4e849d (git)
  • From b5b3e23e4cace008e1a30e8614a484d14dfd07a1 before 825656ae61e73ddc05f585e6258d284c87064b10 (git)
  • From b5b3e23e4cace008e1a30e8614a484d14dfd07a1 before c8e7d4a1166f063703955f1b2e765a6db5bf1771 (git)
  • From b5b3e23e4cace008e1a30e8614a484d14dfd07a1 before f30060efcf18883748a0541aa41acef183cd9c0e (git)
  • From b5b3e23e4cace008e1a30e8614a484d14dfd07a1 before 52438e734c1566f5e2bcd9a065d2d65e306c0555 (git)
  • From b5b3e23e4cace008e1a30e8614a484d14dfd07a1 before 5dfdac5e3f8db5f4445228c44f64091045644a3b (git)
  • From b5b3e23e4cace008e1a30e8614a484d14dfd07a1 before 92a1df9c6da20c02cf9872f8b025a66ddb307aeb (git)
  • From b5b3e23e4cace008e1a30e8614a484d14dfd07a1 before 93d904a734a74c54d945a9884b4962977f1176cd (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/nfc/nfcmrvl/i2c.c
Default Status
affected
Versions
Affected
  • 4.4
Unaffected
  • From 0 before 4.4 (semver)
  • From 4.9.333 through 4.9.* (semver)
  • From 4.14.299 through 4.14.* (semver)
  • From 4.19.265 through 4.19.* (semver)
  • From 5.4.224 through 5.4.* (semver)
  • From 5.10.154 through 5.10.* (semver)
  • From 5.15.78 through 5.15.* (semver)
  • From 6.0.8 through 6.0.* (semver)
  • From 6.1 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/dd0ee55ead91fbb16889dbe7ff0b0f7c9e4e849d
N/A
https://git.kernel.org/stable/c/825656ae61e73ddc05f585e6258d284c87064b10
N/A
https://git.kernel.org/stable/c/c8e7d4a1166f063703955f1b2e765a6db5bf1771
N/A
https://git.kernel.org/stable/c/f30060efcf18883748a0541aa41acef183cd9c0e
N/A
https://git.kernel.org/stable/c/52438e734c1566f5e2bcd9a065d2d65e306c0555
N/A
https://git.kernel.org/stable/c/5dfdac5e3f8db5f4445228c44f64091045644a3b
N/A
https://git.kernel.org/stable/c/92a1df9c6da20c02cf9872f8b025a66ddb307aeb
N/A
https://git.kernel.org/stable/c/93d904a734a74c54d945a9884b4962977f1176cd
N/A
Hyperlink: https://git.kernel.org/stable/c/dd0ee55ead91fbb16889dbe7ff0b0f7c9e4e849d
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/825656ae61e73ddc05f585e6258d284c87064b10
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/c8e7d4a1166f063703955f1b2e765a6db5bf1771
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/f30060efcf18883748a0541aa41acef183cd9c0e
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/52438e734c1566f5e2bcd9a065d2d65e306c0555
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/5dfdac5e3f8db5f4445228c44f64091045644a3b
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/92a1df9c6da20c02cf9872f8b025a66ddb307aeb
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/93d904a734a74c54d945a9884b4962977f1176cd
Resource: N/A
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:416baaa9-dc9f-4396-8d5f-8c081fb06d67
Published At:01 May, 2025 | 15:16
Updated At:07 May, 2025 | 13:28

In the Linux kernel, the following vulnerability has been resolved: nfc: nfcmrvl: Fix potential memory leak in nfcmrvl_i2c_nci_send() nfcmrvl_i2c_nci_send() will be called by nfcmrvl_nci_send(), and skb should be freed in nfcmrvl_i2c_nci_send(). However, nfcmrvl_nci_send() will only free skb when i2c_master_send() return >=0, which means skb will memleak when i2c_master_send() failed. Free skb no matter whether i2c_master_send() succeeds.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.15.5MEDIUM
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Type: Primary
Version: 3.1
Base score: 5.5
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CPE Matches

Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 4.4(inclusive) to 4.9.333(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 4.10(inclusive) to 4.14.299(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 4.15(inclusive) to 4.19.265(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 4.20(inclusive) to 5.4.224(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 5.5(inclusive) to 5.10.154(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 5.11(inclusive) to 5.15.78(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 5.16(inclusive) to 6.0.8(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>6.1
cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>6.1
cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>6.1
cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-401Primarynvd@nist.gov
CWE ID: CWE-401
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://git.kernel.org/stable/c/52438e734c1566f5e2bcd9a065d2d65e306c0555416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/5dfdac5e3f8db5f4445228c44f64091045644a3b416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/825656ae61e73ddc05f585e6258d284c87064b10416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/92a1df9c6da20c02cf9872f8b025a66ddb307aeb416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/93d904a734a74c54d945a9884b4962977f1176cd416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/c8e7d4a1166f063703955f1b2e765a6db5bf1771416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/dd0ee55ead91fbb16889dbe7ff0b0f7c9e4e849d416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/f30060efcf18883748a0541aa41acef183cd9c0e416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
Hyperlink: https://git.kernel.org/stable/c/52438e734c1566f5e2bcd9a065d2d65e306c0555
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/5dfdac5e3f8db5f4445228c44f64091045644a3b
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/825656ae61e73ddc05f585e6258d284c87064b10
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/92a1df9c6da20c02cf9872f8b025a66ddb307aeb
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/93d904a734a74c54d945a9884b4962977f1176cd
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/c8e7d4a1166f063703955f1b2e765a6db5bf1771
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/dd0ee55ead91fbb16889dbe7ff0b0f7c9e4e849d
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/f30060efcf18883748a0541aa41acef183cd9c0e
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch

Change History

0
Information is not available yet

Similar CVEs

0Records found

Details not found