First published: Thu Mar 27 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: EDAC/highbank: Fix memory leak in highbank_mc_probe() When devres_open_group() fails, it returns -ENOMEM without freeing memory allocated by edac_mc_alloc(). Call edac_mc_free() on the error handling path to avoid a memory leak. [ bp: Massage commit message. ]
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | ||
Linux Kernel | >=3.6<4.14.305 | |
Linux Kernel | >=4.15<4.19.272 | |
Linux Kernel | >=4.20<5.4.231 | |
Linux Kernel | >=5.5<5.10.166 | |
Linux Kernel | >=5.11<5.15.91 | |
Linux Kernel | >=5.16<6.1.9 | |
Linux Kernel | =6.2-rc1 | |
Linux Kernel | =6.2-rc2 | |
Linux Kernel | =6.2-rc3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-49757 has been classified as a moderate severity vulnerability.
To fix CVE-2022-49757, update to the latest version of the Linux kernel where the memory leak in highbank_mc_probe() has been addressed.
CVE-2022-49757 results in a memory leak when devres_open_group() fails without freeing allocated memory.
All affected versions of the Linux kernel are those prior to the patch that resolves CVE-2022-49757.
CVE-2022-49757 requires specific conditions that may make it less likely to be exploited in practice.