In the Linux kernel, the following vulnerability has been resolved:
can: mcan: pci: add missing mcanclassfree_dev() in probe/remove methods
In mcanpciremove() and error handling path of mcanpciprobe(), mcanclassfreedev() should be called to free resource allocated by mcanclassallocatedev(), otherwise there will be memleak.
{ "vanir_signatures": [ { "signature_version": "v1", "digest": { "length": 269.0, "function_hash": "235789822263456905785474070387682849037" }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0bbb88651ef6b7fbb1bf75ec7ba69add632e834b", "deprecated": false, "target": { "file": "drivers/net/can/m_can/m_can_pci.c", "function": "m_can_pci_remove" }, "signature_type": "Function", "id": "CVE-2022-49024-01dd4fdd" }, { "signature_version": "v1", "digest": { "threshold": 0.9, "line_hashes": [ "53019715998946988136484316749793798620", "12784473591898191751945548242725476039", "194771037160574893232498189585378778563", "169753369855314685862424585168305979755", "125221705601821590328060040627725872285", "267540007974457120251041431608924645570", "288953872864198434829483640739445332094", "281674507683820171820506582424878232472", "270642663741924065632136084280414421389", "207868930760536415972511739981170436695", "316772008869336774401045989936523371473", "48068206427411251637738553731909685166", "321351166586560797483029997418696683153", "47736240535437438834093396112797619141", "187614630164173115763288604662311786953", "29362875477801489692167266680445457665", "50122258049526680327689140310845908519" ] }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1eca1d4cc21b6d0fc5f9a390339804c0afce9439", "deprecated": false, "target": { "file": "drivers/net/can/m_can/m_can_pci.c" }, "signature_type": "Line", "id": "CVE-2022-49024-0d7a248a" }, { "signature_version": "v1", "digest": { "length": 1115.0, "function_hash": "48157880675819656160372224124717241231" }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ea8dc27bb044e19868155e500ce397007be98656", "deprecated": false, "target": { "file": "drivers/net/can/m_can/m_can_pci.c", "function": "m_can_pci_probe" }, "signature_type": "Function", "id": "CVE-2022-49024-283b9d1b" }, { "signature_version": "v1", "digest": { "threshold": 0.9, "line_hashes": [ "53019715998946988136484316749793798620", "12784473591898191751945548242725476039", "194771037160574893232498189585378778563", "169753369855314685862424585168305979755", "125221705601821590328060040627725872285", "267540007974457120251041431608924645570", "288953872864198434829483640739445332094", "281674507683820171820506582424878232472", "270642663741924065632136084280414421389", "207868930760536415972511739981170436695", "316772008869336774401045989936523371473", "48068206427411251637738553731909685166", "321351166586560797483029997418696683153", "47736240535437438834093396112797619141", "187614630164173115763288604662311786953", "29362875477801489692167266680445457665", "50122258049526680327689140310845908519" ] }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ea8dc27bb044e19868155e500ce397007be98656", "deprecated": false, "target": { "file": "drivers/net/can/m_can/m_can_pci.c" }, "signature_type": "Line", "id": "CVE-2022-49024-781cb0d5" }, { "signature_version": "v1", "digest": { "length": 1115.0, "function_hash": "48157880675819656160372224124717241231" }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1eca1d4cc21b6d0fc5f9a390339804c0afce9439", "deprecated": false, "target": { "file": "drivers/net/can/m_can/m_can_pci.c", "function": "m_can_pci_probe" }, "signature_type": "Function", "id": "CVE-2022-49024-8e64f201" }, { "signature_version": "v1", "digest": { "length": 1115.0, "function_hash": "48157880675819656160372224124717241231" }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0bbb88651ef6b7fbb1bf75ec7ba69add632e834b", "deprecated": false, "target": { "file": "drivers/net/can/m_can/m_can_pci.c", "function": "m_can_pci_probe" }, "signature_type": "Function", "id": "CVE-2022-49024-9662f732" }, { "signature_version": "v1", "digest": { "threshold": 0.9, "line_hashes": [ "53019715998946988136484316749793798620", "12784473591898191751945548242725476039", "194771037160574893232498189585378778563", "169753369855314685862424585168305979755", "125221705601821590328060040627725872285", "267540007974457120251041431608924645570", "288953872864198434829483640739445332094", "281674507683820171820506582424878232472", "270642663741924065632136084280414421389", "207868930760536415972511739981170436695", "316772008869336774401045989936523371473", "48068206427411251637738553731909685166", "321351166586560797483029997418696683153", "47736240535437438834093396112797619141", "187614630164173115763288604662311786953", "29362875477801489692167266680445457665", "50122258049526680327689140310845908519" ] }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0bbb88651ef6b7fbb1bf75ec7ba69add632e834b", "deprecated": false, "target": { "file": "drivers/net/can/m_can/m_can_pci.c" }, "signature_type": "Line", "id": "CVE-2022-49024-9d0bd2e4" }, { "signature_version": "v1", "digest": { "length": 269.0, "function_hash": "235789822263456905785474070387682849037" }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1eca1d4cc21b6d0fc5f9a390339804c0afce9439", "deprecated": false, "target": { "file": "drivers/net/can/m_can/m_can_pci.c", "function": "m_can_pci_remove" }, "signature_type": "Function", "id": "CVE-2022-49024-c20780b6" }, { "signature_version": "v1", "digest": { "length": 269.0, "function_hash": "235789822263456905785474070387682849037" }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ea8dc27bb044e19868155e500ce397007be98656", "deprecated": false, "target": { "file": "drivers/net/can/m_can/m_can_pci.c", "function": "m_can_pci_remove" }, "signature_type": "Function", "id": "CVE-2022-49024-dcf84227" } ] }