First published: Thu Mar 27 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: dmaengine: imx-sdma: Fix a possible memory leak in sdma_transfer_init If the function sdma_load_context() fails, the sdma_desc will be freed, but the allocated desc->bd is forgot to be freed. We already met the sdma_load_context() failure case and the log as below: [ 450.699064] imx-sdma 30bd0000.dma-controller: Timeout waiting for CH0 ready ... In this case, the desc->bd will not be freed without this change.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | ||
Linux Kernel | <4.19.272 | |
Linux Kernel | >=4.20<5.4.231 | |
Linux Kernel | >=5.5<5.10.167 | |
Linux Kernel | >=5.11<5.15.92 | |
Linux Kernel | >=5.16<6.1.10 | |
Linux Kernel | =6.2-rc1 | |
Linux Kernel | =6.2-rc2 | |
Linux Kernel | =6.2-rc3 | |
Linux Kernel | =6.2-rc4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-49746 has a severity rating that may impact the system's memory management.
To resolve CVE-2022-49746, update the Linux kernel to the latest version where the vulnerability has been mitigated.
CVE-2022-49746 is a memory leak vulnerability within the Linux kernel's DMA engine.
CVE-2022-49746 affects the imx-sdma component of the Linux kernel.
Specific versions of the Linux kernel that utilize the imx-sdma DMA engine may be affected, and it’s advisable to check for updates.