In the Linux kernel, the following vulnerability has been resolved:
dmaengine: ti: k3-udma-glue: fix memory leak when register device fail
If deviceregister() fails, it should call putdevice() to give up reference, the name allocated in devsetname() can be freed in callback function kobject_cleanup().
[
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ac2b9f34f02052709aea7b34bb2a165e1853eb41",
"deprecated": false,
"digest": {
"function_hash": "115432204604649576336006577192393713201",
"length": 2981.0
},
"target": {
"function": "k3_udma_glue_request_tx_chn",
"file": "drivers/dma/ti/k3-udma-glue.c"
},
"id": "CVE-2022-49860-0355986d",
"signature_version": "v1",
"signature_type": "Function"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@025eab5189fc7ee223ae9b4bc49d7df196543e53",
"deprecated": false,
"digest": {
"threshold": 0.9,
"line_hashes": [
"85061811117814843751675016315300357844",
"90334429301629375215229010999008783723",
"261991872011451960027203239184120998546",
"332969697397922858698419164988139365295",
"45353823457530049695644140258981636876",
"267729448463140545423522623377161568175",
"28486239747885677464081755411000303092",
"278307421503511419080456262046343999134",
"258731696888065166788868442037847119759",
"267729448463140545423522623377161568175",
"28486239747885677464081755411000303092",
"278307421503511419080456262046343999134"
]
},
"target": {
"file": "drivers/dma/ti/k3-udma-glue.c"
},
"id": "CVE-2022-49860-33b3de8b",
"signature_version": "v1",
"signature_type": "Line"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@025eab5189fc7ee223ae9b4bc49d7df196543e53",
"deprecated": false,
"digest": {
"function_hash": "71086350888726981355330099240035159228",
"length": 3032.0
},
"target": {
"function": "k3_udma_glue_request_rx_chn_priv",
"file": "drivers/dma/ti/k3-udma-glue.c"
},
"id": "CVE-2022-49860-4afd36d0",
"signature_version": "v1",
"signature_type": "Function"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@025eab5189fc7ee223ae9b4bc49d7df196543e53",
"deprecated": false,
"digest": {
"function_hash": "115432204604649576336006577192393713201",
"length": 2981.0
},
"target": {
"function": "k3_udma_glue_request_tx_chn",
"file": "drivers/dma/ti/k3-udma-glue.c"
},
"id": "CVE-2022-49860-4cb2e9a4",
"signature_version": "v1",
"signature_type": "Function"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1dd27541aa2b95bde71bddd43d73f9c16d73272c",
"deprecated": false,
"digest": {
"threshold": 0.9,
"line_hashes": [
"85061811117814843751675016315300357844",
"90334429301629375215229010999008783723",
"261991872011451960027203239184120998546",
"332969697397922858698419164988139365295",
"45353823457530049695644140258981636876",
"267729448463140545423522623377161568175",
"28486239747885677464081755411000303092",
"278307421503511419080456262046343999134",
"258731696888065166788868442037847119759",
"267729448463140545423522623377161568175",
"28486239747885677464081755411000303092",
"278307421503511419080456262046343999134"
]
},
"target": {
"file": "drivers/dma/ti/k3-udma-glue.c"
},
"id": "CVE-2022-49860-7ecbb8bf",
"signature_version": "v1",
"signature_type": "Line"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1dd27541aa2b95bde71bddd43d73f9c16d73272c",
"deprecated": false,
"digest": {
"function_hash": "304071419493889322785445649787167687835",
"length": 1817.0
},
"target": {
"function": "k3_udma_glue_request_remote_rx_chn",
"file": "drivers/dma/ti/k3-udma-glue.c"
},
"id": "CVE-2022-49860-86abc68f",
"signature_version": "v1",
"signature_type": "Function"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ac2b9f34f02052709aea7b34bb2a165e1853eb41",
"deprecated": false,
"digest": {
"threshold": 0.9,
"line_hashes": [
"85061811117814843751675016315300357844",
"90334429301629375215229010999008783723",
"261991872011451960027203239184120998546",
"332969697397922858698419164988139365295",
"45353823457530049695644140258981636876",
"267729448463140545423522623377161568175",
"28486239747885677464081755411000303092",
"278307421503511419080456262046343999134",
"258731696888065166788868442037847119759",
"267729448463140545423522623377161568175",
"28486239747885677464081755411000303092",
"278307421503511419080456262046343999134"
]
},
"target": {
"file": "drivers/dma/ti/k3-udma-glue.c"
},
"id": "CVE-2022-49860-8713dc6a",
"signature_version": "v1",
"signature_type": "Line"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1dd27541aa2b95bde71bddd43d73f9c16d73272c",
"deprecated": false,
"digest": {
"function_hash": "115432204604649576336006577192393713201",
"length": 2981.0
},
"target": {
"function": "k3_udma_glue_request_tx_chn",
"file": "drivers/dma/ti/k3-udma-glue.c"
},
"id": "CVE-2022-49860-8914b5ef",
"signature_version": "v1",
"signature_type": "Function"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1dd27541aa2b95bde71bddd43d73f9c16d73272c",
"deprecated": false,
"digest": {
"function_hash": "71086350888726981355330099240035159228",
"length": 3032.0
},
"target": {
"function": "k3_udma_glue_request_rx_chn_priv",
"file": "drivers/dma/ti/k3-udma-glue.c"
},
"id": "CVE-2022-49860-967a9ec3",
"signature_version": "v1",
"signature_type": "Function"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@025eab5189fc7ee223ae9b4bc49d7df196543e53",
"deprecated": false,
"digest": {
"function_hash": "304071419493889322785445649787167687835",
"length": 1817.0
},
"target": {
"function": "k3_udma_glue_request_remote_rx_chn",
"file": "drivers/dma/ti/k3-udma-glue.c"
},
"id": "CVE-2022-49860-9fc82576",
"signature_version": "v1",
"signature_type": "Function"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ac2b9f34f02052709aea7b34bb2a165e1853eb41",
"deprecated": false,
"digest": {
"function_hash": "304071419493889322785445649787167687835",
"length": 1817.0
},
"target": {
"function": "k3_udma_glue_request_remote_rx_chn",
"file": "drivers/dma/ti/k3-udma-glue.c"
},
"id": "CVE-2022-49860-d921d441",
"signature_version": "v1",
"signature_type": "Function"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ac2b9f34f02052709aea7b34bb2a165e1853eb41",
"deprecated": false,
"digest": {
"function_hash": "71086350888726981355330099240035159228",
"length": 3032.0
},
"target": {
"function": "k3_udma_glue_request_rx_chn_priv",
"file": "drivers/dma/ti/k3-udma-glue.c"
},
"id": "CVE-2022-49860-fc3de0b6",
"signature_version": "v1",
"signature_type": "Function"
}
]