In the Linux kernel, the following vulnerability has been resolved:
gpio: mockup: Fix potential resource leakage when register a chip
If creation of software node fails, the locally allocated string array is left unfreed. Free it on error path.
[
{
"signature_type": "Function",
"digest": {
"length": 1136.0,
"function_hash": "6476092796289621249425423682260677837"
},
"id": "CVE-2022-48661-1aed8fc5",
"target": {
"file": "drivers/gpio/gpio-mockup.c",
"function": "gpio_mockup_register_chip"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@02743c4091ccfb246f5cdbbe3f44b152d5d12933",
"deprecated": false
},
{
"signature_type": "Function",
"digest": {
"length": 1123.0,
"function_hash": "232013664263610070248608834844830990138"
},
"id": "CVE-2022-48661-307ae0ea",
"target": {
"file": "drivers/gpio/gpio-mockup.c",
"function": "gpio_mockup_register_chip"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9b26723e058faaf11b532fb4aa16d6849d581790",
"deprecated": false
},
{
"signature_type": "Function",
"digest": {
"length": 1136.0,
"function_hash": "6476092796289621249425423682260677837"
},
"id": "CVE-2022-48661-31de5448",
"target": {
"file": "drivers/gpio/gpio-mockup.c",
"function": "gpio_mockup_register_chip"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@41f857033c44442a27f591fda8d986e7c9e42872",
"deprecated": false
},
{
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"162021675816071253502138957970288937062",
"142081004131214879015032146170057583426",
"10208590841129696115120482867361904245",
"181368090909730417552867649157413123459",
"140045165562299911200844661639203976494"
]
},
"id": "CVE-2022-48661-380abc2d",
"target": {
"file": "drivers/gpio/gpio-mockup.c"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@02743c4091ccfb246f5cdbbe3f44b152d5d12933",
"deprecated": false
},
{
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"162021675816071253502138957970288937062",
"142081004131214879015032146170057583426",
"10208590841129696115120482867361904245",
"181368090909730417552867649157413123459",
"140045165562299911200844661639203976494"
]
},
"id": "CVE-2022-48661-dda6d316",
"target": {
"file": "drivers/gpio/gpio-mockup.c"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@41f857033c44442a27f591fda8d986e7c9e42872",
"deprecated": false
},
{
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"162021675816071253502138957970288937062",
"142081004131214879015032146170057583426",
"10208590841129696115120482867361904245",
"181368090909730417552867649157413123459",
"140045165562299911200844661639203976494"
]
},
"id": "CVE-2022-48661-e4cbd9c1",
"target": {
"file": "drivers/gpio/gpio-mockup.c"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9b26723e058faaf11b532fb4aa16d6849d581790",
"deprecated": false
}
]