mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 01:31:20 +00:00
29 lines
1.6 KiB
JSON
29 lines
1.6 KiB
JSON
{
|
|
"id": "CVE-2022-49231",
|
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
|
"published": "2025-02-26T07:01:00.130",
|
|
"lastModified": "2025-02-26T07:01:00.130",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nrtw88: fix memory overrun and memory leak during hw_scan\n\nPreviously we allocated less memory than actual required, overwrite\nto the buffer causes the mm module to complaint and raise access\nviolation faults. Along with potential memory leaks when returned\nearly. Fix these by passing the correct size and proper deinit flow."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: rtw88: se corrige el desbordamiento de memoria y la p\u00e9rdida de memoria durante hw_scan Anteriormente, asign\u00e1bamos menos memoria de la que realmente se requer\u00eda, la sobrescritura en el b\u00fafer hace que el m\u00f3dulo mm se queje y genere fallos de violaci\u00f3n de acceso. Junto con posibles p\u00e9rdidas de memoria cuando se devuelve antes. Solucione estos problemas pasando el tama\u00f1o correcto y el flujo de deinit adecuado."
|
|
}
|
|
],
|
|
"metrics": {},
|
|
"references": [
|
|
{
|
|
"url": "https://git.kernel.org/stable/c/d95984b5580dcb8b1c0036577c52b609990a1dab",
|
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
|
},
|
|
{
|
|
"url": "https://git.kernel.org/stable/c/ec5da191bfcd5fd22b95459b623694f66c1cc10b",
|
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
|
}
|
|
]
|
|
} |