In the Linux kernel, the following vulnerability has been resolved:
net: sfp: fix memory leak in sfp_probe()
sfpprobe() allocates a memory chunk from sfp with sfpalloc(). When devmaddaction() fails, sfp is not freed, which leads to a memory leak.
We should use devmaddactionorreset() instead of devmaddaction().
[
{
"signature_version": "v1",
"id": "CVE-2022-49619-370fa28d",
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"308985414131786148145271968016970137294",
"111392986992998539800826964302541136468",
"113786865960292073897085345564866106716",
"331843474098167654029046093239612454842"
]
},
"target": {
"file": "drivers/net/phy/sfp.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ede990cfc42775bd0141e21f37ee365dcaeeb50f",
"deprecated": false
},
{
"signature_version": "v1",
"id": "CVE-2022-49619-43894d55",
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"308985414131786148145271968016970137294",
"111392986992998539800826964302541136468",
"113786865960292073897085345564866106716",
"331843474098167654029046093239612454842"
]
},
"target": {
"file": "drivers/net/phy/sfp.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@204543581a2f26bb3b997a304c0bd06926ba7f15",
"deprecated": false
},
{
"signature_version": "v1",
"id": "CVE-2022-49619-61cbcbe2",
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"308985414131786148145271968016970137294",
"111392986992998539800826964302541136468",
"113786865960292073897085345564866106716",
"331843474098167654029046093239612454842"
]
},
"target": {
"file": "drivers/net/phy/sfp.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f22ddc8a5278d7fb6369a0aeb0d8775a0aefaaee",
"deprecated": false
},
{
"signature_version": "v1",
"id": "CVE-2022-49619-ac262544",
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"308985414131786148145271968016970137294",
"111392986992998539800826964302541136468",
"113786865960292073897085345564866106716",
"331843474098167654029046093239612454842"
]
},
"target": {
"file": "drivers/net/phy/sfp.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1545bc727625ea6e8decd717e5d1e8cc704ccf8f",
"deprecated": false
},
{
"signature_version": "v1",
"id": "CVE-2022-49619-d7327eb4",
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"308985414131786148145271968016970137294",
"111392986992998539800826964302541136468",
"113786865960292073897085345564866106716",
"331843474098167654029046093239612454842"
]
},
"target": {
"file": "drivers/net/phy/sfp.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@67dc32542a1fb7790d0853cf4a5cf859ac6a2002",
"deprecated": false
},
{
"signature_version": "v1",
"id": "CVE-2022-49619-e3bcdc55",
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"308985414131786148145271968016970137294",
"111392986992998539800826964302541136468",
"113786865960292073897085345564866106716",
"41086520839606072807126044097737239104"
]
},
"target": {
"file": "drivers/net/phy/sfp.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9ec5a97f327a89031fce6cfc3e95543c53936638",
"deprecated": false
},
{
"signature_version": "v1",
"id": "CVE-2022-49619-fb6c236e",
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"308985414131786148145271968016970137294",
"111392986992998539800826964302541136468",
"113786865960292073897085345564866106716",
"331843474098167654029046093239612454842"
]
},
"target": {
"file": "drivers/net/phy/sfp.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0a18d802d65cf662644fd1d369c86d84a5630652",
"deprecated": false
}
]