CVE-2022-49757

Source
https://cve.org/CVERecord?id=CVE-2022-49757
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49757.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49757
Downstream
Published
2025-03-27T16:43:04.787Z
Modified
2026-04-11T12:44:31.260850Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
EDAC/highbank: Fix memory leak in highbank_mc_probe()
Details

In the Linux kernel, the following vulnerability has been resolved:

EDAC/highbank: Fix memory leak in highbankmcprobe()

When devresopengroup() fails, it returns -ENOMEM without freeing memory allocated by edacmcalloc().

Call edacmcfree() on the error handling path to avoid a memory leak.

[ bp: Massage commit message. ]

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49757.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
a1b01edb274518c7da6d69b84e7558c092282aad
Fixed
f1b3e23ed8df87d779ee86ac37f379e79a24169a
Fixed
0db40e23b56d217eebd385bebb64057ef764b2c7
Fixed
8d23f5d25264beb223ee79cdb530b88c237719fc
Fixed
329fbd260352a7b9a83781d8b8bd96f95844a51f
Fixed
caffa7fed1397d1395052272c93900176de86557
Fixed
b7863ef8a8f0fee96b4eb41211f4918c0e047253
Fixed
e7a293658c20a7945014570e1921bf7d25d68a36

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49757.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
3.6.0
Fixed
4.14.305
Type
ECOSYSTEM
Events
Introduced
4.15.0
Fixed
4.19.272
Type
ECOSYSTEM
Events
Introduced
4.20.0
Fixed
5.4.231
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.166
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.91
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.9

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49757.json"