In the Linux kernel, the following vulnerability has been resolved:
scsi: target: tcmloop: Fix possible name leak in tcmloopsetuphba_bus()
If deviceregister() fails in tcmloopsetuphbabus(), the name allocated by devsetname() need be freed. As comment of deviceregister() says, it should use putdevice() to give up the reference in the error path. So fix this by calling putdevice(), then the name can be freed in kobjectcleanup(). The 'tlhba' will be freed in tcmlooprelease_adapter(), so it don't need goto error label in this case.
{ "vanir_signatures": [ { "id": "CVE-2022-49780-28a6996f", "signature_type": "Function", "target": { "file": "drivers/target/loopback/tcm_loop.c", "function": "tcm_loop_setup_hba_bus" }, "signature_version": "v1", "digest": { "length": 420.0, "function_hash": "201304238847047841842864868095488359879" }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@bc68e428d4963af0201e92159629ab96948f0893" }, { "id": "CVE-2022-49780-30f8834e", "signature_type": "Function", "target": { "file": "drivers/target/loopback/tcm_loop.c", "function": "tcm_loop_make_scsi_hba" }, "signature_version": "v1", "digest": { "length": 1301.0, "function_hash": "165680679418087800226366482437584184003" }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a636772988bafab89278e7bb3420d8e8eacfe912" }, { "id": "CVE-2022-49780-37e4578b", "signature_type": "Function", "target": { "file": "drivers/target/loopback/tcm_loop.c", "function": "tcm_loop_make_scsi_hba" }, "signature_version": "v1", "digest": { "length": 1301.0, "function_hash": "165680679418087800226366482437584184003" }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@bc68e428d4963af0201e92159629ab96948f0893" }, { "id": "CVE-2022-49780-3fab19a8", "signature_type": "Function", "target": { "file": "drivers/target/loopback/tcm_loop.c", "function": "tcm_loop_make_scsi_hba" }, "signature_version": "v1", "digest": { "length": 1301.0, "function_hash": "165680679418087800226366482437584184003" }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@dce0589a3faec9e2e543e97bca7e62592ec85585" }, { "id": "CVE-2022-49780-4028d2ff", "signature_type": "Line", "target": { "file": "drivers/target/loopback/tcm_loop.c" }, "signature_version": "v1", "digest": { "line_hashes": [ "8461015163957883285186210944665371601", "192028529719627136952497661173980228156", "265775506164547559473070797701729058266", "217121523149775147098290151134949762498", "78405352769178442080345471557600627774", "2145390139219890112681273378946412549", "139435940296353061092808952524300317737", "165102706075808971117147846418971203336" ], "threshold": 0.9 }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@41a6b8b527a5957fab41c3c05e25ad125268e2e9" }, { "id": "CVE-2022-49780-519b3e08", "signature_type": "Function", "target": { "file": "drivers/target/loopback/tcm_loop.c", "function": "tcm_loop_make_scsi_hba" }, "signature_version": "v1", "digest": { "length": 1301.0, "function_hash": "165680679418087800226366482437584184003" }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@41a6b8b527a5957fab41c3c05e25ad125268e2e9" }, { "id": "CVE-2022-49780-625ed12d", "signature_type": "Line", "target": { "file": "drivers/target/loopback/tcm_loop.c" }, "signature_version": "v1", "digest": { "line_hashes": [ "8461015163957883285186210944665371601", "192028529719627136952497661173980228156", "265775506164547559473070797701729058266", "217121523149775147098290151134949762498", "78405352769178442080345471557600627774", "2145390139219890112681273378946412549", "139435940296353061092808952524300317737", "165102706075808971117147846418971203336" ], "threshold": 0.9 }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@dce0589a3faec9e2e543e97bca7e62592ec85585" }, { "id": "CVE-2022-49780-8553668b", "signature_type": "Line", "target": { "file": "drivers/target/loopback/tcm_loop.c" }, "signature_version": "v1", "digest": { "line_hashes": [ "8461015163957883285186210944665371601", "192028529719627136952497661173980228156", "265775506164547559473070797701729058266", "217121523149775147098290151134949762498", "78405352769178442080345471557600627774", "2145390139219890112681273378946412549", "139435940296353061092808952524300317737", "165102706075808971117147846418971203336" ], "threshold": 0.9 }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@75205f1b47a88c3fac4f30bd7567e89b2887c7fd" }, { "id": "CVE-2022-49780-96ca629e", "signature_type": "Line", "target": { "file": "drivers/target/loopback/tcm_loop.c" }, "signature_version": "v1", "digest": { "line_hashes": [ "8461015163957883285186210944665371601", "192028529719627136952497661173980228156", "265775506164547559473070797701729058266", "217121523149775147098290151134949762498", "78405352769178442080345471557600627774", "2145390139219890112681273378946412549", "139435940296353061092808952524300317737", "165102706075808971117147846418971203336" ], "threshold": 0.9 }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@bc68e428d4963af0201e92159629ab96948f0893" }, { "id": "CVE-2022-49780-a603dd82", "signature_type": "Function", "target": { "file": "drivers/target/loopback/tcm_loop.c", "function": "tcm_loop_setup_hba_bus" }, "signature_version": "v1", "digest": { "length": 420.0, "function_hash": "201304238847047841842864868095488359879" }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a636772988bafab89278e7bb3420d8e8eacfe912" }, { "id": "CVE-2022-49780-ba5d8835", "signature_type": "Line", "target": { "file": "drivers/target/loopback/tcm_loop.c" }, "signature_version": "v1", "digest": { "line_hashes": [ "8461015163957883285186210944665371601", "192028529719627136952497661173980228156", "265775506164547559473070797701729058266", "217121523149775147098290151134949762498", "78405352769178442080345471557600627774", "2145390139219890112681273378946412549", "139435940296353061092808952524300317737", "165102706075808971117147846418971203336" ], "threshold": 0.9 }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a636772988bafab89278e7bb3420d8e8eacfe912" }, { "id": "CVE-2022-49780-bd1e997f", "signature_type": "Function", "target": { "file": "drivers/target/loopback/tcm_loop.c", "function": "tcm_loop_setup_hba_bus" }, "signature_version": "v1", "digest": { "length": 420.0, "function_hash": "201304238847047841842864868095488359879" }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@dce0589a3faec9e2e543e97bca7e62592ec85585" }, { "id": "CVE-2022-49780-c0b51bb1", "signature_type": "Function", "target": { "file": "drivers/target/loopback/tcm_loop.c", "function": "tcm_loop_make_scsi_hba" }, "signature_version": "v1", "digest": { "length": 1301.0, "function_hash": "165680679418087800226366482437584184003" }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@28f7ff5e7559d226e63c7c5de74eb075a83d8c53" }, { "id": "CVE-2022-49780-c245a73c", "signature_type": "Function", "target": { "file": "drivers/target/loopback/tcm_loop.c", "function": "tcm_loop_make_scsi_hba" }, "signature_version": "v1", "digest": { "length": 1301.0, "function_hash": "165680679418087800226366482437584184003" }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@75205f1b47a88c3fac4f30bd7567e89b2887c7fd" }, { "id": "CVE-2022-49780-d584f707", "signature_type": "Function", "target": { "file": "drivers/target/loopback/tcm_loop.c", "function": "tcm_loop_setup_hba_bus" }, "signature_version": "v1", "digest": { "length": 420.0, "function_hash": "201304238847047841842864868095488359879" }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@75205f1b47a88c3fac4f30bd7567e89b2887c7fd" }, { "id": "CVE-2022-49780-e9f6d3d6", "signature_type": "Function", "target": { "file": "drivers/target/loopback/tcm_loop.c", "function": "tcm_loop_setup_hba_bus" }, "signature_version": "v1", "digest": { "length": 420.0, "function_hash": "201304238847047841842864868095488359879" }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@41a6b8b527a5957fab41c3c05e25ad125268e2e9" }, { "id": "CVE-2022-49780-f6d3e967", "signature_type": "Function", "target": { "file": "drivers/target/loopback/tcm_loop.c", "function": "tcm_loop_setup_hba_bus" }, "signature_version": "v1", "digest": { "length": 420.0, "function_hash": "201304238847047841842864868095488359879" }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@28f7ff5e7559d226e63c7c5de74eb075a83d8c53" }, { "id": "CVE-2022-49780-f7513fbf", "signature_type": "Line", "target": { "file": "drivers/target/loopback/tcm_loop.c" }, "signature_version": "v1", "digest": { "line_hashes": [ "8461015163957883285186210944665371601", "192028529719627136952497661173980228156", "265775506164547559473070797701729058266", "217121523149775147098290151134949762498", "78405352769178442080345471557600627774", "2145390139219890112681273378946412549", "139435940296353061092808952524300317737", "165102706075808971117147846418971203336" ], "threshold": 0.9 }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@28f7ff5e7559d226e63c7c5de74eb075a83d8c53" } ] }