| { |
| "containers": { |
| "cna": { |
| "providerMetadata": { |
| "orgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038" |
| }, |
| "descriptions": [ |
| { |
| "lang": "en", |
| "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfc: nfcmrvl: Fix potential memory leak in nfcmrvl_i2c_nci_send()\n\nnfcmrvl_i2c_nci_send() will be called by nfcmrvl_nci_send(), and skb\nshould be freed in nfcmrvl_i2c_nci_send(). However, nfcmrvl_nci_send()\nwill only free skb when i2c_master_send() return >=0, which means skb\nwill memleak when i2c_master_send() failed. Free skb no matter whether\ni2c_master_send() succeeds." |
| } |
| ], |
| "affected": [ |
| { |
| "product": "Linux", |
| "vendor": "Linux", |
| "defaultStatus": "unaffected", |
| "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", |
| "programFiles": [ |
| "drivers/nfc/nfcmrvl/i2c.c" |
| ], |
| "versions": [ |
| { |
| "version": "b5b3e23e4cace008e1a30e8614a484d14dfd07a1", |
| "lessThan": "dd0ee55ead91fbb16889dbe7ff0b0f7c9e4e849d", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "b5b3e23e4cace008e1a30e8614a484d14dfd07a1", |
| "lessThan": "825656ae61e73ddc05f585e6258d284c87064b10", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "b5b3e23e4cace008e1a30e8614a484d14dfd07a1", |
| "lessThan": "c8e7d4a1166f063703955f1b2e765a6db5bf1771", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "b5b3e23e4cace008e1a30e8614a484d14dfd07a1", |
| "lessThan": "f30060efcf18883748a0541aa41acef183cd9c0e", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "b5b3e23e4cace008e1a30e8614a484d14dfd07a1", |
| "lessThan": "52438e734c1566f5e2bcd9a065d2d65e306c0555", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "b5b3e23e4cace008e1a30e8614a484d14dfd07a1", |
| "lessThan": "5dfdac5e3f8db5f4445228c44f64091045644a3b", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "b5b3e23e4cace008e1a30e8614a484d14dfd07a1", |
| "lessThan": "92a1df9c6da20c02cf9872f8b025a66ddb307aeb", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "b5b3e23e4cace008e1a30e8614a484d14dfd07a1", |
| "lessThan": "93d904a734a74c54d945a9884b4962977f1176cd", |
| "status": "affected", |
| "versionType": "git" |
| } |
| ] |
| }, |
| { |
| "product": "Linux", |
| "vendor": "Linux", |
| "defaultStatus": "affected", |
| "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", |
| "programFiles": [ |
| "drivers/nfc/nfcmrvl/i2c.c" |
| ], |
| "versions": [ |
| { |
| "version": "4.4", |
| "status": "affected" |
| }, |
| { |
| "version": "0", |
| "lessThan": "4.4", |
| "status": "unaffected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "4.9.333", |
| "lessThanOrEqual": "4.9.*", |
| "status": "unaffected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "4.14.299", |
| "lessThanOrEqual": "4.14.*", |
| "status": "unaffected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "4.19.265", |
| "lessThanOrEqual": "4.19.*", |
| "status": "unaffected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "5.4.224", |
| "lessThanOrEqual": "5.4.*", |
| "status": "unaffected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "5.10.154", |
| "lessThanOrEqual": "5.10.*", |
| "status": "unaffected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "5.15.78", |
| "lessThanOrEqual": "5.15.*", |
| "status": "unaffected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "6.0.8", |
| "lessThanOrEqual": "6.0.*", |
| "status": "unaffected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "6.1", |
| "lessThanOrEqual": "*", |
| "status": "unaffected", |
| "versionType": "original_commit_for_fix" |
| } |
| ] |
| } |
| ], |
| "cpeApplicability": [ |
| { |
| "nodes": [ |
| { |
| "operator": "OR", |
| "negate": false, |
| "cpeMatch": [ |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "4.4", |
| "versionEndExcluding": "4.9.333" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "4.4", |
| "versionEndExcluding": "4.14.299" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "4.4", |
| "versionEndExcluding": "4.19.265" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "4.4", |
| "versionEndExcluding": "5.4.224" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "4.4", |
| "versionEndExcluding": "5.10.154" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "4.4", |
| "versionEndExcluding": "5.15.78" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "4.4", |
| "versionEndExcluding": "6.0.8" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "4.4", |
| "versionEndExcluding": "6.1" |
| } |
| ] |
| } |
| ] |
| } |
| ], |
| "references": [ |
| { |
| "url": "https://git.kernel.org/stable/c/dd0ee55ead91fbb16889dbe7ff0b0f7c9e4e849d" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/825656ae61e73ddc05f585e6258d284c87064b10" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/c8e7d4a1166f063703955f1b2e765a6db5bf1771" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/f30060efcf18883748a0541aa41acef183cd9c0e" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/52438e734c1566f5e2bcd9a065d2d65e306c0555" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/5dfdac5e3f8db5f4445228c44f64091045644a3b" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/92a1df9c6da20c02cf9872f8b025a66ddb307aeb" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/93d904a734a74c54d945a9884b4962977f1176cd" |
| } |
| ], |
| "title": "nfc: nfcmrvl: Fix potential memory leak in nfcmrvl_i2c_nci_send()", |
| "x_generator": { |
| "engine": "bippy-1.2.0" |
| } |
| } |
| }, |
| "cveMetadata": { |
| "assignerOrgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038", |
| "cveID": "CVE-2022-49922", |
| "requesterUserId": "gregkh@kernel.org", |
| "serial": "1", |
| "state": "PUBLISHED" |
| }, |
| "dataType": "CVE_RECORD", |
| "dataVersion": "5.0" |
| } |