In the Linux kernel, the following vulnerability has been resolved:
can: mcan: pci: add missing mcanclassfree_dev() in probe/remove methods
In mcanpciremove() and error handling path of mcanpciprobe(), mcanclassfreedev() should be called to free resource allocated by mcanclassallocatedev(), otherwise there will be memleak.
[
{
"signature_type": "Function",
"digest": {
"function_hash": "235789822263456905785474070387682849037",
"length": 269.0
},
"target": {
"file": "drivers/net/can/m_can/m_can_pci.c",
"function": "m_can_pci_remove"
},
"signature_version": "v1",
"id": "CVE-2022-49024-01dd4fdd",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0bbb88651ef6b7fbb1bf75ec7ba69add632e834b"
},
{
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"53019715998946988136484316749793798620",
"12784473591898191751945548242725476039",
"194771037160574893232498189585378778563",
"169753369855314685862424585168305979755",
"125221705601821590328060040627725872285",
"267540007974457120251041431608924645570",
"288953872864198434829483640739445332094",
"281674507683820171820506582424878232472",
"270642663741924065632136084280414421389",
"207868930760536415972511739981170436695",
"316772008869336774401045989936523371473",
"48068206427411251637738553731909685166",
"321351166586560797483029997418696683153",
"47736240535437438834093396112797619141",
"187614630164173115763288604662311786953",
"29362875477801489692167266680445457665",
"50122258049526680327689140310845908519"
]
},
"target": {
"file": "drivers/net/can/m_can/m_can_pci.c"
},
"signature_version": "v1",
"id": "CVE-2022-49024-0d7a248a",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1eca1d4cc21b6d0fc5f9a390339804c0afce9439"
},
{
"signature_type": "Function",
"digest": {
"function_hash": "48157880675819656160372224124717241231",
"length": 1115.0
},
"target": {
"file": "drivers/net/can/m_can/m_can_pci.c",
"function": "m_can_pci_probe"
},
"signature_version": "v1",
"id": "CVE-2022-49024-283b9d1b",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ea8dc27bb044e19868155e500ce397007be98656"
},
{
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"53019715998946988136484316749793798620",
"12784473591898191751945548242725476039",
"194771037160574893232498189585378778563",
"169753369855314685862424585168305979755",
"125221705601821590328060040627725872285",
"267540007974457120251041431608924645570",
"288953872864198434829483640739445332094",
"281674507683820171820506582424878232472",
"270642663741924065632136084280414421389",
"207868930760536415972511739981170436695",
"316772008869336774401045989936523371473",
"48068206427411251637738553731909685166",
"321351166586560797483029997418696683153",
"47736240535437438834093396112797619141",
"187614630164173115763288604662311786953",
"29362875477801489692167266680445457665",
"50122258049526680327689140310845908519"
]
},
"target": {
"file": "drivers/net/can/m_can/m_can_pci.c"
},
"signature_version": "v1",
"id": "CVE-2022-49024-781cb0d5",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ea8dc27bb044e19868155e500ce397007be98656"
},
{
"signature_type": "Function",
"digest": {
"function_hash": "48157880675819656160372224124717241231",
"length": 1115.0
},
"target": {
"file": "drivers/net/can/m_can/m_can_pci.c",
"function": "m_can_pci_probe"
},
"signature_version": "v1",
"id": "CVE-2022-49024-8e64f201",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1eca1d4cc21b6d0fc5f9a390339804c0afce9439"
},
{
"signature_type": "Function",
"digest": {
"function_hash": "48157880675819656160372224124717241231",
"length": 1115.0
},
"target": {
"file": "drivers/net/can/m_can/m_can_pci.c",
"function": "m_can_pci_probe"
},
"signature_version": "v1",
"id": "CVE-2022-49024-9662f732",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0bbb88651ef6b7fbb1bf75ec7ba69add632e834b"
},
{
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"53019715998946988136484316749793798620",
"12784473591898191751945548242725476039",
"194771037160574893232498189585378778563",
"169753369855314685862424585168305979755",
"125221705601821590328060040627725872285",
"267540007974457120251041431608924645570",
"288953872864198434829483640739445332094",
"281674507683820171820506582424878232472",
"270642663741924065632136084280414421389",
"207868930760536415972511739981170436695",
"316772008869336774401045989936523371473",
"48068206427411251637738553731909685166",
"321351166586560797483029997418696683153",
"47736240535437438834093396112797619141",
"187614630164173115763288604662311786953",
"29362875477801489692167266680445457665",
"50122258049526680327689140310845908519"
]
},
"target": {
"file": "drivers/net/can/m_can/m_can_pci.c"
},
"signature_version": "v1",
"id": "CVE-2022-49024-9d0bd2e4",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0bbb88651ef6b7fbb1bf75ec7ba69add632e834b"
},
{
"signature_type": "Function",
"digest": {
"function_hash": "235789822263456905785474070387682849037",
"length": 269.0
},
"target": {
"file": "drivers/net/can/m_can/m_can_pci.c",
"function": "m_can_pci_remove"
},
"signature_version": "v1",
"id": "CVE-2022-49024-c20780b6",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1eca1d4cc21b6d0fc5f9a390339804c0afce9439"
},
{
"signature_type": "Function",
"digest": {
"function_hash": "235789822263456905785474070387682849037",
"length": 269.0
},
"target": {
"file": "drivers/net/can/m_can/m_can_pci.c",
"function": "m_can_pci_remove"
},
"signature_version": "v1",
"id": "CVE-2022-49024-dcf84227",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ea8dc27bb044e19868155e500ce397007be98656"
}
]