CVE-2022-49746

In the Linux kernel, the following vulnerability has been resolved: dmaengine: imx-sdma: Fix a possible memory leak in sdma_transfer_init If the function sdma_load_context() fails, the sdma_desc will be freed, but the allocated desc->bd is forgot to be freed. We already met the sdma_load_context() failure case and the log as below: [ 450.699064] imx-sdma 30bd0000.dma-controller: Timeout waiting for CH0 ready ... In this case, the desc->bd will not be freed without this change.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc4:*:*:*:*:*:*

History

14 Apr 2025, 20:27

Type Values Removed Values Added
First Time Linux linux Kernel
Linux
CWE CWE-401
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: dmaengine: imx-sdma: Se corrige una posible fuga de memoria en sdma_transfer_init. Si la función sdma_load_context() falla, se libera sdma_desc, pero se olvida liberar el desc->bd asignado. Ya se ha detectado el fallo de sdma_load_context() y el registro es el siguiente: [450.699064] imx-sdma 30bd0000.dma-controller: Tiempo de espera agotado para que CH0 esté listo... En este caso, el desc->bd no se liberará sin este cambio.
References () https://git.kernel.org/stable/c/1417f59ac0b02130ee56c0c50794b9b257be3d17 - () https://git.kernel.org/stable/c/1417f59ac0b02130ee56c0c50794b9b257be3d17 - Patch
References () https://git.kernel.org/stable/c/43acd767bd90c5d4172ce7fee5d9007a9a08dea9 - () https://git.kernel.org/stable/c/43acd767bd90c5d4172ce7fee5d9007a9a08dea9 - Patch
References () https://git.kernel.org/stable/c/80ee99e52936b2c04cc37b17a14b2ae2f9d282ac - () https://git.kernel.org/stable/c/80ee99e52936b2c04cc37b17a14b2ae2f9d282ac - Patch
References () https://git.kernel.org/stable/c/bd0050b7ffa87c7b260d563646af612f4112a778 - () https://git.kernel.org/stable/c/bd0050b7ffa87c7b260d563646af612f4112a778 - Patch
References () https://git.kernel.org/stable/c/ce4745a6b8016fae74c95dcd457d4ceef7d98af1 - () https://git.kernel.org/stable/c/ce4745a6b8016fae74c95dcd457d4ceef7d98af1 - Patch
References () https://git.kernel.org/stable/c/dbe634ce824329d8f14079c3e9f8f11670894bec - () https://git.kernel.org/stable/c/dbe634ce824329d8f14079c3e9f8f11670894bec - Patch
CPE cpe:2.3:o:linux:linux_kernel:6.2:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

27 Mar 2025, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-03-27 17:15

Updated : 2025-04-14 20:27


NVD link : CVE-2022-49746

Mitre link : CVE-2022-49746

CVE.ORG link : CVE-2022-49746


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-401

Missing Release of Memory after Effective Lifetime