CVE-2022-49757

In the Linux kernel, the following vulnerability has been resolved: EDAC/highbank: Fix memory leak in highbank_mc_probe() When devres_open_group() fails, it returns -ENOMEM without freeing memory allocated by edac_mc_alloc(). Call edac_mc_free() on the error handling path to avoid a memory leak. [ bp: Massage commit message. ]
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*

History

15 Apr 2025, 14:51

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: EDAC/highbank: Se corrige la pérdida de memoria en highbank_mc_probe(). Cuando devres_open_group() falla, devuelve -ENOMEM sin liberar la memoria asignada por edac_mc_alloc(). Se llama a edac_mc_free() en la ruta de gestión de errores para evitar una pérdida de memoria. [bp: Mensaje de confirmación de Modificación].
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux linux Kernel
Linux
References () https://git.kernel.org/stable/c/0db40e23b56d217eebd385bebb64057ef764b2c7 - () https://git.kernel.org/stable/c/0db40e23b56d217eebd385bebb64057ef764b2c7 - Patch
References () https://git.kernel.org/stable/c/329fbd260352a7b9a83781d8b8bd96f95844a51f - () https://git.kernel.org/stable/c/329fbd260352a7b9a83781d8b8bd96f95844a51f - Patch
References () https://git.kernel.org/stable/c/8d23f5d25264beb223ee79cdb530b88c237719fc - () https://git.kernel.org/stable/c/8d23f5d25264beb223ee79cdb530b88c237719fc - Patch
References () https://git.kernel.org/stable/c/b7863ef8a8f0fee96b4eb41211f4918c0e047253 - () https://git.kernel.org/stable/c/b7863ef8a8f0fee96b4eb41211f4918c0e047253 - Patch
References () https://git.kernel.org/stable/c/caffa7fed1397d1395052272c93900176de86557 - () https://git.kernel.org/stable/c/caffa7fed1397d1395052272c93900176de86557 - Patch
References () https://git.kernel.org/stable/c/e7a293658c20a7945014570e1921bf7d25d68a36 - () https://git.kernel.org/stable/c/e7a293658c20a7945014570e1921bf7d25d68a36 - Patch
References () https://git.kernel.org/stable/c/f1b3e23ed8df87d779ee86ac37f379e79a24169a - () https://git.kernel.org/stable/c/f1b3e23ed8df87d779ee86ac37f379e79a24169a - Patch
CWE CWE-401

27 Mar 2025, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-03-27 17:15

Updated : 2025-04-15 14:51


NVD link : CVE-2022-49757

Mitre link : CVE-2022-49757

CVE.ORG link : CVE-2022-49757


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-401

Missing Release of Memory after Effective Lifetime