Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: can: m_can: pci: add missing m_can_class_free_dev() in probe/remove methods In m_can_pci_remove() and error handling path of m_can_pci_probe(), m_can_class_free_dev() should be called to free resource allocated by m_can_class_allocate_dev(), otherwise there will be memleak.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 5.11, < 5.15.82 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/0bbb88651ef6b7fbb1bf75ec7ba69add632e834bPatch
- https://git.kernel.org/stable/c/1eca1d4cc21b6d0fc5f9a390339804c0afce9439Patch
- https://git.kernel.org/stable/c/ea8dc27bb044e19868155e500ce397007be98656Patch
FAQ
What is CVE-2022-49024?
CVE-2022-49024 is a vulnerability with a CVSS score of 5.5 (MEDIUM). In the Linux kernel, the following vulnerability has been resolved: can: m_can: pci: add missing m_can_class_free_dev() in probe/remove methods In m_can_pci_remove() and error handling path of m_can...
How severe is CVE-2022-49024?
CVE-2022-49024 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-49024?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.