SB2025050242 - Memory leak in Linux kernel dma ti driver
Published: May 2, 2025 Updated: May 10, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Memory leak (CVE-ID: CVE-2022-49860)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the k3_udma_glue_request_tx_chn(), k3_udma_glue_request_rx_chn_priv() and k3_udma_glue_request_remote_rx_chn() functions in drivers/dma/ti/k3-udma-glue.c. A local user can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/025eab5189fc7ee223ae9b4bc49d7df196543e53
- https://git.kernel.org/stable/c/1dd27541aa2b95bde71bddd43d73f9c16d73272c
- https://git.kernel.org/stable/c/ac2b9f34f02052709aea7b34bb2a165e1853eb41
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.79
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.0.9
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1