In the Linux kernel, the following vulnerability has been resolved:
ibmvnic: Free rwi on reset success
Free the rwi structure in the event that the last rwi in the list processed successfully. The logic in commit 4f408e1fa6e1 ("ibmvnic: retry reset if there are no other resets") introduces an issue that results in a 32 byte memory leak whenever the last rwi in the list gets processed.
[
{
"deprecated": false,
"id": "CVE-2022-49906-31b3232a",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c3543a287cfba9105dcc4bb41eb817f51266caaf",
"digest": {
"line_hashes": [
"88923766897890596380364611190966129056",
"157714957184134193984840477852697403680",
"246078991161648760058323033647850509655",
"218137976550240243017936745307141940209",
"331360734926900217813029542142825536130",
"8424797681521213956451078262563068834",
"214638120240027504600283297026344158681"
],
"threshold": 0.9
},
"target": {
"file": "drivers/net/ethernet/ibm/ibmvnic.c"
},
"signature_type": "Line",
"signature_version": "v1"
},
{
"deprecated": false,
"id": "CVE-2022-49906-3ff4677d",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@535b78739ae75f257c894a05b1afa86ad9a3669e",
"digest": {
"line_hashes": [
"88923766897890596380364611190966129056",
"157714957184134193984840477852697403680",
"246078991161648760058323033647850509655",
"218137976550240243017936745307141940209",
"331360734926900217813029542142825536130",
"8424797681521213956451078262563068834",
"214638120240027504600283297026344158681"
],
"threshold": 0.9
},
"target": {
"file": "drivers/net/ethernet/ibm/ibmvnic.c"
},
"signature_type": "Line",
"signature_version": "v1"
},
{
"deprecated": false,
"id": "CVE-2022-49906-ba61fd1f",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d6dd2fe71153f0ff748bf188bd4af076fe09a0a6",
"digest": {
"function_hash": "307714745341878401964536929755902954005",
"length": 2602.0
},
"target": {
"function": "__ibmvnic_reset",
"file": "drivers/net/ethernet/ibm/ibmvnic.c"
},
"signature_type": "Function",
"signature_version": "v1"
},
{
"deprecated": false,
"id": "CVE-2022-49906-c5e469d6",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d6dd2fe71153f0ff748bf188bd4af076fe09a0a6",
"digest": {
"line_hashes": [
"88923766897890596380364611190966129056",
"157714957184134193984840477852697403680",
"246078991161648760058323033647850509655",
"218137976550240243017936745307141940209",
"331360734926900217813029542142825536130",
"8424797681521213956451078262563068834",
"214638120240027504600283297026344158681"
],
"threshold": 0.9
},
"target": {
"file": "drivers/net/ethernet/ibm/ibmvnic.c"
},
"signature_type": "Line",
"signature_version": "v1"
},
{
"deprecated": false,
"id": "CVE-2022-49906-e105d531",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c3543a287cfba9105dcc4bb41eb817f51266caaf",
"digest": {
"function_hash": "307714745341878401964536929755902954005",
"length": 2602.0
},
"target": {
"function": "__ibmvnic_reset",
"file": "drivers/net/ethernet/ibm/ibmvnic.c"
},
"signature_type": "Function",
"signature_version": "v1"
},
{
"deprecated": false,
"id": "CVE-2022-49906-fce183be",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@535b78739ae75f257c894a05b1afa86ad9a3669e",
"digest": {
"function_hash": "307714745341878401964536929755902954005",
"length": 2602.0
},
"target": {
"function": "__ibmvnic_reset",
"file": "drivers/net/ethernet/ibm/ibmvnic.c"
},
"signature_type": "Function",
"signature_version": "v1"
}
]