In the Linux kernel, the following vulnerability has been resolved:
lib/string_helpers: fix not adding strarray to device's resource list
Add allocated strarray to device's resource list. This is a must to automatically release strarray when the device disappears.
Without this fix we have a memory leak in the few drivers which use devmkasprintfstrarray().
[
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"178171364568231820881862564422203376044",
"300964924223747695439033413047412002259",
"185269031227277490705571030422044865540"
]
},
"target": {
"file": "lib/string_helpers.c"
},
"id": "CVE-2022-49403-0257d1ea",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a152eb42fcecfe41239c3c6695342f3a128593e7",
"signature_type": "Line"
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"function_hash": "32619199112824444790304624553398951479",
"length": 362.0
},
"target": {
"function": "devm_kasprintf_strarray",
"file": "lib/string_helpers.c"
},
"id": "CVE-2022-49403-83e8b869",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a152eb42fcecfe41239c3c6695342f3a128593e7",
"signature_type": "Function"
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"function_hash": "32619199112824444790304624553398951479",
"length": 362.0
},
"target": {
"function": "devm_kasprintf_strarray",
"file": "lib/string_helpers.c"
},
"id": "CVE-2022-49403-8d4d4742",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@bf29edab0c9ff3d2633b8306a67d04c357e2a385",
"signature_type": "Function"
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"178171364568231820881862564422203376044",
"300964924223747695439033413047412002259",
"185269031227277490705571030422044865540"
]
},
"target": {
"file": "lib/string_helpers.c"
},
"id": "CVE-2022-49403-b0f1a6d8",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@bf29edab0c9ff3d2633b8306a67d04c357e2a385",
"signature_type": "Line"
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"function_hash": "32619199112824444790304624553398951479",
"length": 362.0
},
"target": {
"function": "devm_kasprintf_strarray",
"file": "lib/string_helpers.c"
},
"id": "CVE-2022-49403-bc99c75f",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@cd290a9839cee2f6641558877e707bd373c8f6f1",
"signature_type": "Function"
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"178171364568231820881862564422203376044",
"300964924223747695439033413047412002259",
"185269031227277490705571030422044865540"
]
},
"target": {
"file": "lib/string_helpers.c"
},
"id": "CVE-2022-49403-dea9ab29",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@cd290a9839cee2f6641558877e707bd373c8f6f1",
"signature_type": "Line"
}
]