CVE-2022-48774

In the Linux kernel, the following vulnerability has been resolved: dmaengine: ptdma: Fix the error handling path in pt_core_init() In order to free resources correctly in the error handling path of pt_core_init(), 2 goto's have to be switched. Otherwise, some resources will leak and we will try to release things that have not been allocated yet. Also move a dev_err() to a place where it is more meaningful.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.17:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.17:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.17:rc4:*:*:*:*:*:*

History

24 Sep 2025, 18:18

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux
Linux linux Kernel
References () https://git.kernel.org/stable/c/3c62fd3406e0b2277c76a6984d3979c7f3f1d129 - () https://git.kernel.org/stable/c/3c62fd3406e0b2277c76a6984d3979c7f3f1d129 - Patch
References () https://git.kernel.org/stable/c/3e41445287afa3cf6d572778e5aab31d25e60a8d - () https://git.kernel.org/stable/c/3e41445287afa3cf6d572778e5aab31d25e60a8d - Patch
References () https://git.kernel.org/stable/c/d7de1e4820c5a42441ff7276174c8c0e63575c1b - () https://git.kernel.org/stable/c/d7de1e4820c5a42441ff7276174c8c0e63575c1b - Patch
CWE NVD-CWE-Other
CPE cpe:2.3:o:linux:linux_kernel:5.17:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.17:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.17:rc3:*:*:*:*:*:*

21 Nov 2024, 07:33

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: dmaengine: ptdma: corrige la ruta de manejo de errores en pt_core_init() Para liberar recursos correctamente en la ruta de manejo de errores de pt_core_init(), se deben cambiar 2 goto. De lo contrario, algunos recursos se filtrarán e intentaremos liberar cosas que aún no se han asignado. También mueva un dev_err() a un lugar donde sea más significativo.
References () https://git.kernel.org/stable/c/3c62fd3406e0b2277c76a6984d3979c7f3f1d129 - () https://git.kernel.org/stable/c/3c62fd3406e0b2277c76a6984d3979c7f3f1d129 -
References () https://git.kernel.org/stable/c/3e41445287afa3cf6d572778e5aab31d25e60a8d - () https://git.kernel.org/stable/c/3e41445287afa3cf6d572778e5aab31d25e60a8d -
References () https://git.kernel.org/stable/c/d7de1e4820c5a42441ff7276174c8c0e63575c1b - () https://git.kernel.org/stable/c/d7de1e4820c5a42441ff7276174c8c0e63575c1b -

16 Jul 2024, 12:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-16 12:15

Updated : 2025-09-24 18:18


NVD link : CVE-2022-48774

Mitre link : CVE-2022-48774

CVE.ORG link : CVE-2022-48774


JSON object : View

Products Affected

linux

  • linux_kernel