CVE-2022-48774

In the Linux kernel, the following vulnerability has been resolved: dmaengine: ptdma: Fix the error handling path in pt_core_init() In order to free resources correctly in the error handling path of pt_core_init(), 2 goto's have to be switched. Otherwise, some resources will leak and we will try to release things that have not been allocated yet. Also move a dev_err() to a place where it is more meaningful.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.17:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.17:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.17:rc4:*:*:*:*:*:*

History

24 Sep 2025, 18:18

Type Values Removed Values Added
CWE NVD-CWE-Other
First Time Linux
Linux linux Kernel
References () https://git.kernel.org/stable/c/3c62fd3406e0b2277c76a6984d3979c7f3f1d129 - () https://git.kernel.org/stable/c/3c62fd3406e0b2277c76a6984d3979c7f3f1d129 - Patch
References () https://git.kernel.org/stable/c/3e41445287afa3cf6d572778e5aab31d25e60a8d - () https://git.kernel.org/stable/c/3e41445287afa3cf6d572778e5aab31d25e60a8d - Patch
References () https://git.kernel.org/stable/c/d7de1e4820c5a42441ff7276174c8c0e63575c1b - () https://git.kernel.org/stable/c/d7de1e4820c5a42441ff7276174c8c0e63575c1b - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:5.17:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.17:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.17:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Information

Published : 2024-07-16 12:15

Updated : 2025-09-24 18:18


NVD link : CVE-2022-48774

Mitre link : CVE-2022-48774

CVE.ORG link : CVE-2022-48774


JSON object : View

Products Affected

linux

  • linux_kernel