CVE-2022-49566

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-49566
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-49566.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-49566
Downstream
Related
Published
2025-02-26T02:23:11Z
Modified
2025-10-21T10:38:55.680984Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
crypto: qat - fix memory leak in RSA
Details

In the Linux kernel, the following vulnerability has been resolved:

crypto: qat - fix memory leak in RSA

When an RSA key represented in form 2 (as defined in PKCS #1 V2.1) is used, some components of the private key persist even after the TFM is released. Replace the explicit calls to free the buffers in qatrsaexittfm() with a call to qatrsaclearctx() which frees all buffers referenced in the TFM context.

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
879f77e9071f029e1c9bd5a75814ecf51370f846
Fixed
a843925e0287eebb4aa808666bf22c664dfe4c53
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
879f77e9071f029e1c9bd5a75814ecf51370f846
Fixed
0f967fdc09955221a1951a279481b0bf4d359941
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
879f77e9071f029e1c9bd5a75814ecf51370f846
Fixed
80a52e1ee7757b742f96bfb0d58f0c14eb6583d0

Affected versions

v4.*

v4.10
v4.10-rc1
v4.10-rc2
v4.10-rc3
v4.10-rc4
v4.10-rc5
v4.10-rc6
v4.10-rc7
v4.10-rc8
v4.11
v4.11-rc1
v4.11-rc2
v4.11-rc3
v4.11-rc4
v4.11-rc5
v4.11-rc6
v4.11-rc7
v4.11-rc8
v4.12
v4.12-rc1
v4.12-rc2
v4.12-rc3
v4.12-rc4
v4.12-rc5
v4.12-rc6
v4.12-rc7
v4.13
v4.13-rc1
v4.13-rc2
v4.13-rc3
v4.13-rc4
v4.13-rc5
v4.13-rc6
v4.13-rc7
v4.14
v4.14-rc1
v4.14-rc2
v4.14-rc3
v4.14-rc4
v4.14-rc5
v4.14-rc6
v4.14-rc7
v4.14-rc8
v4.15
v4.15-rc1
v4.15-rc2
v4.15-rc3
v4.15-rc4
v4.15-rc5
v4.15-rc6
v4.15-rc7
v4.15-rc8
v4.15-rc9
v4.16
v4.16-rc1
v4.16-rc2
v4.16-rc3
v4.16-rc4
v4.16-rc5
v4.16-rc6
v4.16-rc7
v4.17
v4.17-rc1
v4.17-rc2
v4.17-rc3
v4.17-rc4
v4.17-rc5
v4.17-rc6
v4.17-rc7
v4.18
v4.18-rc1
v4.18-rc2
v4.18-rc3
v4.18-rc4
v4.18-rc5
v4.18-rc6
v4.18-rc7
v4.18-rc8
v4.19
v4.19-rc1
v4.19-rc2
v4.19-rc3
v4.19-rc4
v4.19-rc5
v4.19-rc6
v4.19-rc7
v4.19-rc8
v4.20
v4.20-rc1
v4.20-rc2
v4.20-rc3
v4.20-rc4
v4.20-rc5
v4.20-rc6
v4.20-rc7
v4.7
v4.7-rc2
v4.7-rc3
v4.7-rc4
v4.7-rc5
v4.7-rc6
v4.7-rc7
v4.8
v4.8-rc1
v4.8-rc2
v4.8-rc3
v4.8-rc4
v4.8-rc5
v4.8-rc6
v4.8-rc7
v4.8-rc8
v4.9
v4.9-rc1
v4.9-rc2
v4.9-rc3
v4.9-rc4
v4.9-rc5
v4.9-rc6
v4.9-rc7
v4.9-rc8

v5.*

v5.0
v5.0-rc1
v5.0-rc2
v5.0-rc3
v5.0-rc4
v5.0-rc5
v5.0-rc6
v5.0-rc7
v5.0-rc8
v5.1
v5.1-rc1
v5.1-rc2
v5.1-rc3
v5.1-rc4
v5.1-rc5
v5.1-rc6
v5.1-rc7
v5.10
v5.10-rc1
v5.10-rc2
v5.10-rc3
v5.10-rc4
v5.10-rc5
v5.10-rc6
v5.10-rc7
v5.11
v5.11-rc1
v5.11-rc2
v5.11-rc3
v5.11-rc4
v5.11-rc5
v5.11-rc6
v5.11-rc7
v5.12
v5.12-rc1
v5.12-rc1-dontuse
v5.12-rc2
v5.12-rc3
v5.12-rc4
v5.12-rc5
v5.12-rc6
v5.12-rc7
v5.12-rc8
v5.13
v5.13-rc1
v5.13-rc2
v5.13-rc3
v5.13-rc4
v5.13-rc5
v5.13-rc6
v5.13-rc7
v5.14
v5.14-rc1
v5.14-rc2
v5.14-rc3
v5.14-rc4
v5.14-rc5
v5.14-rc6
v5.14-rc7
v5.15
v5.15-rc1
v5.15-rc2
v5.15-rc3
v5.15-rc4
v5.15-rc5
v5.15-rc6
v5.15-rc7
v5.15.1
v5.15.10
v5.15.11
v5.15.12
v5.15.13
v5.15.14
v5.15.15
v5.15.16
v5.15.17
v5.15.18
v5.15.19
v5.15.2
v5.15.20
v5.15.21
v5.15.22
v5.15.23
v5.15.24
v5.15.25
v5.15.26
v5.15.27
v5.15.28
v5.15.29
v5.15.3
v5.15.30
v5.15.31
v5.15.32
v5.15.33
v5.15.34
v5.15.35
v5.15.36
v5.15.37
v5.15.38
v5.15.39
v5.15.4
v5.15.40
v5.15.41
v5.15.42
v5.15.43
v5.15.44
v5.15.45
v5.15.46
v5.15.47
v5.15.48
v5.15.49
v5.15.5
v5.15.50
v5.15.51
v5.15.52
v5.15.53
v5.15.54
v5.15.55
v5.15.56
v5.15.57
v5.15.6
v5.15.7
v5.15.8
v5.15.9
v5.16
v5.16-rc1
v5.16-rc2
v5.16-rc3
v5.16-rc4
v5.16-rc5
v5.16-rc6
v5.16-rc7
v5.16-rc8
v5.17
v5.17-rc1
v5.17-rc2
v5.17-rc3
v5.17-rc4
v5.17-rc5
v5.17-rc6
v5.17-rc7
v5.17-rc8
v5.18
v5.18-rc1
v5.18-rc2
v5.18-rc3
v5.18-rc4
v5.18-rc5
v5.18-rc6
v5.18-rc7
v5.18.1
v5.18.10
v5.18.11
v5.18.12
v5.18.13
v5.18.14
v5.18.2
v5.18.3
v5.18.4
v5.18.5
v5.18.6
v5.18.7
v5.18.8
v5.18.9
v5.2
v5.2-rc1
v5.2-rc2
v5.2-rc3
v5.2-rc4
v5.2-rc5
v5.2-rc6
v5.2-rc7
v5.3
v5.3-rc1
v5.3-rc2
v5.3-rc3
v5.3-rc4
v5.3-rc5
v5.3-rc6
v5.3-rc7
v5.3-rc8
v5.4
v5.4-rc1
v5.4-rc2
v5.4-rc3
v5.4-rc4
v5.4-rc5
v5.4-rc6
v5.4-rc7
v5.4-rc8
v5.5
v5.5-rc1
v5.5-rc2
v5.5-rc3
v5.5-rc4
v5.5-rc5
v5.5-rc6
v5.5-rc7
v5.6
v5.6-rc1
v5.6-rc2
v5.6-rc3
v5.6-rc4
v5.6-rc5
v5.6-rc6
v5.6-rc7
v5.7
v5.7-rc1
v5.7-rc2
v5.7-rc3
v5.7-rc4
v5.7-rc5
v5.7-rc6
v5.7-rc7
v5.8
v5.8-rc1
v5.8-rc2
v5.8-rc3
v5.8-rc4
v5.8-rc5
v5.8-rc6
v5.8-rc7
v5.9
v5.9-rc1
v5.9-rc2
v5.9-rc3
v5.9-rc4
v5.9-rc5
v5.9-rc6
v5.9-rc7
v5.9-rc8

Database specific

vanir_signatures

[
    {
        "deprecated": false,
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a843925e0287eebb4aa808666bf22c664dfe4c53",
        "digest": {
            "line_hashes": [
                "132988387272611610747512406339907004982",
                "291058135487289151189992484273130164889",
                "200845195163242166733900819596826414669",
                "82999802412553096897204863553762741588",
                "10628141205541748405173672556419213343",
                "101343746269115271467205486500637512951",
                "130908132099141474786979775564794244907",
                "313023145762231090991907268756948827603",
                "20325688312388163234041393936651942123",
                "109661648929278900841513709436645734451",
                "313302237130952621805752403114362807853",
                "331673489805957647693638203578363096631",
                "280293647965542615508855298862035475995",
                "69717298772598212197632336347558932377",
                "274372484628993924733995205276904259063"
            ],
            "threshold": 0.9
        },
        "signature_type": "Line",
        "signature_version": "v1",
        "id": "CVE-2022-49566-4191569b",
        "target": {
            "file": "drivers/crypto/qat/qat_common/qat_asym_algs.c"
        }
    },
    {
        "deprecated": false,
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0f967fdc09955221a1951a279481b0bf4d359941",
        "digest": {
            "line_hashes": [
                "132988387272611610747512406339907004982",
                "291058135487289151189992484273130164889",
                "200845195163242166733900819596826414669",
                "82999802412553096897204863553762741588",
                "10628141205541748405173672556419213343",
                "101343746269115271467205486500637512951",
                "130908132099141474786979775564794244907",
                "313023145762231090991907268756948827603",
                "20325688312388163234041393936651942123",
                "109661648929278900841513709436645734451",
                "313302237130952621805752403114362807853",
                "331673489805957647693638203578363096631",
                "280293647965542615508855298862035475995",
                "69717298772598212197632336347558932377",
                "274372484628993924733995205276904259063"
            ],
            "threshold": 0.9
        },
        "signature_type": "Line",
        "signature_version": "v1",
        "id": "CVE-2022-49566-58642638",
        "target": {
            "file": "drivers/crypto/qat/qat_common/qat_asym_algs.c"
        }
    },
    {
        "deprecated": false,
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@80a52e1ee7757b742f96bfb0d58f0c14eb6583d0",
        "digest": {
            "length": 497.0,
            "function_hash": "221577224487971688667009232263788487502"
        },
        "signature_type": "Function",
        "signature_version": "v1",
        "id": "CVE-2022-49566-9815806a",
        "target": {
            "function": "qat_rsa_exit_tfm",
            "file": "drivers/crypto/qat/qat_common/qat_asym_algs.c"
        }
    },
    {
        "deprecated": false,
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@80a52e1ee7757b742f96bfb0d58f0c14eb6583d0",
        "digest": {
            "line_hashes": [
                "132988387272611610747512406339907004982",
                "291058135487289151189992484273130164889",
                "200845195163242166733900819596826414669",
                "82999802412553096897204863553762741588",
                "10628141205541748405173672556419213343",
                "101343746269115271467205486500637512951",
                "130908132099141474786979775564794244907",
                "313023145762231090991907268756948827603",
                "20325688312388163234041393936651942123",
                "109661648929278900841513709436645734451",
                "313302237130952621805752403114362807853",
                "331673489805957647693638203578363096631",
                "280293647965542615508855298862035475995",
                "69717298772598212197632336347558932377",
                "274372484628993924733995205276904259063"
            ],
            "threshold": 0.9
        },
        "signature_type": "Line",
        "signature_version": "v1",
        "id": "CVE-2022-49566-c655f6be",
        "target": {
            "file": "drivers/crypto/qat/qat_common/qat_asym_algs.c"
        }
    },
    {
        "deprecated": false,
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0f967fdc09955221a1951a279481b0bf4d359941",
        "digest": {
            "length": 497.0,
            "function_hash": "221577224487971688667009232263788487502"
        },
        "signature_type": "Function",
        "signature_version": "v1",
        "id": "CVE-2022-49566-ee1e7b0d",
        "target": {
            "function": "qat_rsa_exit_tfm",
            "file": "drivers/crypto/qat/qat_common/qat_asym_algs.c"
        }
    },
    {
        "deprecated": false,
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a843925e0287eebb4aa808666bf22c664dfe4c53",
        "digest": {
            "length": 497.0,
            "function_hash": "221577224487971688667009232263788487502"
        },
        "signature_type": "Function",
        "signature_version": "v1",
        "id": "CVE-2022-49566-f24516f6",
        "target": {
            "function": "qat_rsa_exit_tfm",
            "file": "drivers/crypto/qat/qat_common/qat_asym_algs.c"
        }
    }
]

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.8.0
Fixed
5.15.58
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
5.18.15