In the Linux kernel, the following vulnerability has been resolved:
ibmvnic: Free rwi on reset success
Free the rwi structure in the event that the last rwi in the list processed successfully. The logic in commit 4f408e1fa6e1 ("ibmvnic: retry reset if there are no other resets") introduces an issue that results in a 32 byte memory leak whenever the last rwi in the list gets processed.
{ "vanir_signatures": [ { "signature_version": "v1", "target": { "file": "drivers/net/ethernet/ibm/ibmvnic.c" }, "signature_type": "Line", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c3543a287cfba9105dcc4bb41eb817f51266caaf", "deprecated": false, "digest": { "line_hashes": [ "88923766897890596380364611190966129056", "157714957184134193984840477852697403680", "246078991161648760058323033647850509655", "218137976550240243017936745307141940209", "331360734926900217813029542142825536130", "8424797681521213956451078262563068834", "214638120240027504600283297026344158681" ], "threshold": 0.9 }, "id": "CVE-2022-49906-31b3232a" }, { "signature_version": "v1", "target": { "file": "drivers/net/ethernet/ibm/ibmvnic.c" }, "signature_type": "Line", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@535b78739ae75f257c894a05b1afa86ad9a3669e", "deprecated": false, "digest": { "line_hashes": [ "88923766897890596380364611190966129056", "157714957184134193984840477852697403680", "246078991161648760058323033647850509655", "218137976550240243017936745307141940209", "331360734926900217813029542142825536130", "8424797681521213956451078262563068834", "214638120240027504600283297026344158681" ], "threshold": 0.9 }, "id": "CVE-2022-49906-3ff4677d" }, { "signature_version": "v1", "target": { "function": "__ibmvnic_reset", "file": "drivers/net/ethernet/ibm/ibmvnic.c" }, "signature_type": "Function", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d6dd2fe71153f0ff748bf188bd4af076fe09a0a6", "deprecated": false, "digest": { "length": 2602.0, "function_hash": "307714745341878401964536929755902954005" }, "id": "CVE-2022-49906-ba61fd1f" }, { "signature_version": "v1", "target": { "file": "drivers/net/ethernet/ibm/ibmvnic.c" }, "signature_type": "Line", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d6dd2fe71153f0ff748bf188bd4af076fe09a0a6", "deprecated": false, "digest": { "line_hashes": [ "88923766897890596380364611190966129056", "157714957184134193984840477852697403680", "246078991161648760058323033647850509655", "218137976550240243017936745307141940209", "331360734926900217813029542142825536130", "8424797681521213956451078262563068834", "214638120240027504600283297026344158681" ], "threshold": 0.9 }, "id": "CVE-2022-49906-c5e469d6" }, { "signature_version": "v1", "target": { "function": "__ibmvnic_reset", "file": "drivers/net/ethernet/ibm/ibmvnic.c" }, "signature_type": "Function", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c3543a287cfba9105dcc4bb41eb817f51266caaf", "deprecated": false, "digest": { "length": 2602.0, "function_hash": "307714745341878401964536929755902954005" }, "id": "CVE-2022-49906-e105d531" }, { "signature_version": "v1", "target": { "function": "__ibmvnic_reset", "file": "drivers/net/ethernet/ibm/ibmvnic.c" }, "signature_type": "Function", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@535b78739ae75f257c894a05b1afa86ad9a3669e", "deprecated": false, "digest": { "length": 2602.0, "function_hash": "307714745341878401964536929755902954005" }, "id": "CVE-2022-49906-fce183be" } ] }