In the Linux kernel, the following vulnerability has been resolved:
dmaengine: imx-sdma: Fix a possible memory leak in sdmatransferinit
If the function sdmaloadcontext() fails, the sdma_desc will be freed, but the allocated desc->bd is forgot to be freed.
We already met the sdmaloadcontext() failure case and the log as below: [ 450.699064] imx-sdma 30bd0000.dma-controller: Timeout waiting for CH0 ready ...
In this case, the desc->bd will not be freed without this change.
{ "vanir_signatures": [ { "deprecated": false, "signature_type": "Line", "target": { "file": "drivers/dma/imx-sdma.c" }, "signature_version": "v1", "digest": { "line_hashes": [ "164438843286751186560062260531544623589", "257947020705127690547570458846621031965", "26600701207495172537054532532495753115", "78175308108547507138604792102853869771", "256177724454850147805773216005686379890" ], "threshold": 0.9 }, "id": "CVE-2022-49746-00900d5d", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@80ee99e52936b2c04cc37b17a14b2ae2f9d282ac" }, { "deprecated": false, "signature_type": "Line", "target": { "file": "drivers/dma/imx-sdma.c" }, "signature_version": "v1", "digest": { "line_hashes": [ "164438843286751186560062260531544623589", "257947020705127690547570458846621031965", "26600701207495172537054532532495753115", "78175308108547507138604792102853869771", "256177724454850147805773216005686379890" ], "threshold": 0.9 }, "id": "CVE-2022-49746-46214b57", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1417f59ac0b02130ee56c0c50794b9b257be3d17" }, { "deprecated": false, "signature_type": "Function", "target": { "file": "drivers/dma/imx-sdma.c", "function": "sdma_transfer_init" }, "signature_version": "v1", "digest": { "length": 631.0, "function_hash": "121576564189789118203634159903402363473" }, "id": "CVE-2022-49746-4899a2ab", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@80ee99e52936b2c04cc37b17a14b2ae2f9d282ac" }, { "deprecated": false, "signature_type": "Line", "target": { "file": "drivers/dma/imx-sdma.c" }, "signature_version": "v1", "digest": { "line_hashes": [ "164438843286751186560062260531544623589", "257947020705127690547570458846621031965", "26600701207495172537054532532495753115", "78175308108547507138604792102853869771", "256177724454850147805773216005686379890" ], "threshold": 0.9 }, "id": "CVE-2022-49746-542f5205", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@bd0050b7ffa87c7b260d563646af612f4112a778" }, { "deprecated": false, "signature_type": "Function", "target": { "file": "drivers/dma/imx-sdma.c", "function": "sdma_transfer_init" }, "signature_version": "v1", "digest": { "length": 631.0, "function_hash": "121576564189789118203634159903402363473" }, "id": "CVE-2022-49746-62becc7c", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@bd0050b7ffa87c7b260d563646af612f4112a778" }, { "deprecated": false, "signature_type": "Function", "target": { "file": "drivers/dma/imx-sdma.c", "function": "sdma_transfer_init" }, "signature_version": "v1", "digest": { "length": 779.0, "function_hash": "88416321220064206546640039114077328065" }, "id": "CVE-2022-49746-7a831e58", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ce4745a6b8016fae74c95dcd457d4ceef7d98af1" }, { "deprecated": false, "signature_type": "Function", "target": { "file": "drivers/dma/imx-sdma.c", "function": "sdma_transfer_init" }, "signature_version": "v1", "digest": { "length": 779.0, "function_hash": "88416321220064206546640039114077328065" }, "id": "CVE-2022-49746-7c54f099", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@43acd767bd90c5d4172ce7fee5d9007a9a08dea9" }, { "deprecated": false, "signature_type": "Line", "target": { "file": "drivers/dma/imx-sdma.c" }, "signature_version": "v1", "digest": { "line_hashes": [ "164438843286751186560062260531544623589", "257947020705127690547570458846621031965", "26600701207495172537054532532495753115", "78175308108547507138604792102853869771", "256177724454850147805773216005686379890" ], "threshold": 0.9 }, "id": "CVE-2022-49746-ced4ad64", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@dbe634ce824329d8f14079c3e9f8f11670894bec" }, { "deprecated": false, "signature_type": "Line", "target": { "file": "drivers/dma/imx-sdma.c" }, "signature_version": "v1", "digest": { "line_hashes": [ "164438843286751186560062260531544623589", "257947020705127690547570458846621031965", "26600701207495172537054532532495753115", "78175308108547507138604792102853869771", "256177724454850147805773216005686379890" ], "threshold": 0.9 }, "id": "CVE-2022-49746-e784e77e", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ce4745a6b8016fae74c95dcd457d4ceef7d98af1" }, { "deprecated": false, "signature_type": "Function", "target": { "file": "drivers/dma/imx-sdma.c", "function": "sdma_transfer_init" }, "signature_version": "v1", "digest": { "length": 779.0, "function_hash": "88416321220064206546640039114077328065" }, "id": "CVE-2022-49746-f369e25d", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1417f59ac0b02130ee56c0c50794b9b257be3d17" }, { "deprecated": false, "signature_type": "Line", "target": { "file": "drivers/dma/imx-sdma.c" }, "signature_version": "v1", "digest": { "line_hashes": [ "164438843286751186560062260531544623589", "257947020705127690547570458846621031965", "26600701207495172537054532532495753115", "78175308108547507138604792102853869771", "256177724454850147805773216005686379890" ], "threshold": 0.9 }, "id": "CVE-2022-49746-f7c28af7", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@43acd767bd90c5d4172ce7fee5d9007a9a08dea9" }, { "deprecated": false, "signature_type": "Function", "target": { "file": "drivers/dma/imx-sdma.c", "function": "sdma_transfer_init" }, "signature_version": "v1", "digest": { "length": 631.0, "function_hash": "121576564189789118203634159903402363473" }, "id": "CVE-2022-49746-fd6ae657", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@dbe634ce824329d8f14079c3e9f8f11670894bec" } ] }