In the Linux kernel, the following vulnerability has been resolved:
dmaengine: ti: k3-udma-private: Fix refcount leak bug in ofxudmadev_get()
We should call ofnodeput() for the reference returned by ofparsephandle() in fail path or when it is not used anymore. Here we only need to move the ofnodeput() before the check.
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/48xxx/CVE-2022-48656.json"
}[
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@dd5a6c5a08752b613e83ad2cb5133e72a64b876d",
"signature_version": "v1",
"deprecated": false,
"digest": {
"threshold": 0.9,
"line_hashes": [
"79812116467573467148275311691184763611",
"34595315420379744708739495812213210988",
"78901007737255084775467178832725474798",
"20647454728730728391428961370101734238",
"316297064071235591185738525839465040621",
"23080606140515273724193013916399345628",
"311882863230147360273726916530659723870",
"129581056897402267582264728920408749482",
"324772196515140749318554673369491455569",
"67894733904633544697609092851969928959"
]
},
"signature_type": "Line",
"target": {
"file": "drivers/dma/ti/k3-udma-private.c"
},
"id": "CVE-2022-48656-23a4bfdf"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f9fdb0b86f087c2b7f6c6168dd0985a3c1eda87e",
"signature_version": "v1",
"deprecated": false,
"digest": {
"threshold": 0.9,
"line_hashes": [
"79812116467573467148275311691184763611",
"34595315420379744708739495812213210988",
"78901007737255084775467178832725474798",
"20647454728730728391428961370101734238",
"316297064071235591185738525839465040621",
"23080606140515273724193013916399345628",
"311882863230147360273726916530659723870",
"129581056897402267582264728920408749482",
"324772196515140749318554673369491455569",
"67894733904633544697609092851969928959"
]
},
"signature_type": "Line",
"target": {
"file": "drivers/dma/ti/k3-udma-private.c"
},
"id": "CVE-2022-48656-252cceb1"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a17df55bf6d536712da6902a83db82b82e67d5a2",
"signature_version": "v1",
"deprecated": false,
"digest": {
"function_hash": "225844729987611618530768982386300842833",
"length": 579.0
},
"signature_type": "Function",
"target": {
"function": "of_xudma_dev_get",
"file": "drivers/dma/ti/k3-udma-private.c"
},
"id": "CVE-2022-48656-4b7466f5"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a17df55bf6d536712da6902a83db82b82e67d5a2",
"signature_version": "v1",
"deprecated": false,
"digest": {
"threshold": 0.9,
"line_hashes": [
"79812116467573467148275311691184763611",
"34595315420379744708739495812213210988",
"78901007737255084775467178832725474798",
"20647454728730728391428961370101734238",
"316297064071235591185738525839465040621",
"23080606140515273724193013916399345628",
"311882863230147360273726916530659723870",
"129581056897402267582264728920408749482",
"324772196515140749318554673369491455569",
"67894733904633544697609092851969928959"
]
},
"signature_type": "Line",
"target": {
"file": "drivers/dma/ti/k3-udma-private.c"
},
"id": "CVE-2022-48656-4d0f5346"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@aa11dae059a439af82bae541b134f8f53ac177b5",
"signature_version": "v1",
"deprecated": false,
"digest": {
"function_hash": "225844729987611618530768982386300842833",
"length": 579.0
},
"signature_type": "Function",
"target": {
"function": "of_xudma_dev_get",
"file": "drivers/dma/ti/k3-udma-private.c"
},
"id": "CVE-2022-48656-629d9407"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f9fdb0b86f087c2b7f6c6168dd0985a3c1eda87e",
"signature_version": "v1",
"deprecated": false,
"digest": {
"function_hash": "225844729987611618530768982386300842833",
"length": 579.0
},
"signature_type": "Function",
"target": {
"function": "of_xudma_dev_get",
"file": "drivers/dma/ti/k3-udma-private.c"
},
"id": "CVE-2022-48656-6b6c84d1"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@aa11dae059a439af82bae541b134f8f53ac177b5",
"signature_version": "v1",
"deprecated": false,
"digest": {
"threshold": 0.9,
"line_hashes": [
"79812116467573467148275311691184763611",
"34595315420379744708739495812213210988",
"78901007737255084775467178832725474798",
"20647454728730728391428961370101734238",
"316297064071235591185738525839465040621",
"23080606140515273724193013916399345628",
"311882863230147360273726916530659723870",
"129581056897402267582264728920408749482",
"324772196515140749318554673369491455569",
"67894733904633544697609092851969928959"
]
},
"signature_type": "Line",
"target": {
"file": "drivers/dma/ti/k3-udma-private.c"
},
"id": "CVE-2022-48656-ccfe8540"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@dd5a6c5a08752b613e83ad2cb5133e72a64b876d",
"signature_version": "v1",
"deprecated": false,
"digest": {
"function_hash": "225844729987611618530768982386300842833",
"length": 579.0
},
"signature_type": "Function",
"target": {
"function": "of_xudma_dev_get",
"file": "drivers/dma/ti/k3-udma-private.c"
},
"id": "CVE-2022-48656-d04c7883"
}
]