{"id":"CVE-2022-49746","summary":"dmaengine: imx-sdma: Fix a possible memory leak in sdma_transfer_init","details":"In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: imx-sdma: Fix a possible memory leak in sdma_transfer_init\n\nIf the function sdma_load_context() fails, the sdma_desc will be\nfreed, but the allocated desc-\u003ebd is forgot to be freed.\n\nWe already met the sdma_load_context() failure case and the log as\nbelow:\n[ 450.699064] imx-sdma 30bd0000.dma-controller: Timeout waiting for CH0 ready\n...\n\nIn this case, the desc-\u003ebd will not be freed without this change.","modified":"2026-04-11T12:44:28.681886Z","published":"2025-03-27T16:42:56.372Z","related":["SUSE-SU-2025:1176-1","SUSE-SU-2025:1183-1","SUSE-SU-2025:1195-1","SUSE-SU-2025:1241-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49746.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/1417f59ac0b02130ee56c0c50794b9b257be3d17"},{"type":"WEB","url":"https://git.kernel.org/stable/c/43acd767bd90c5d4172ce7fee5d9007a9a08dea9"},{"type":"WEB","url":"https://git.kernel.org/stable/c/80ee99e52936b2c04cc37b17a14b2ae2f9d282ac"},{"type":"WEB","url":"https://git.kernel.org/stable/c/bd0050b7ffa87c7b260d563646af612f4112a778"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ce4745a6b8016fae74c95dcd457d4ceef7d98af1"},{"type":"WEB","url":"https://git.kernel.org/stable/c/dbe634ce824329d8f14079c3e9f8f11670894bec"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49746.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49746"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"21420841a554dae8a193cd3454ba91d913cfc320"},{"fixed":"80ee99e52936b2c04cc37b17a14b2ae2f9d282ac"},{"fixed":"dbe634ce824329d8f14079c3e9f8f11670894bec"},{"fixed":"bd0050b7ffa87c7b260d563646af612f4112a778"},{"fixed":"43acd767bd90c5d4172ce7fee5d9007a9a08dea9"},{"fixed":"ce4745a6b8016fae74c95dcd457d4ceef7d98af1"},{"fixed":"1417f59ac0b02130ee56c0c50794b9b257be3d17"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49746.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"4.19.0"},{"fixed":"4.19.272"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.20.0"},{"fixed":"5.4.231"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.5.0"},{"fixed":"5.10.167"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.92"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.10"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49746.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}