In the Linux kernel, the following vulnerability has been resolved:
apparmor: Fix memleak in aasimplewritetobuffer()
When copyfromuser failed, the memory is freed by kvfree. however the management struct and data blob are allocated independently, so only kvfree(data) cause a memleak issue here. Use aaputloaddata(data) to fix this issue.
[
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@bf7ebebce2c25071c719fd8a2f1307e0c243c2d7",
"target": {
"file": "security/apparmor/apparmorfs.c"
},
"deprecated": false,
"signature_version": "v1",
"id": "CVE-2022-50074-304c000d",
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"60811421168307444260248195948437246488",
"338085673147948402061055380190214653341",
"319781167269409218367006351681961851356",
"316994777397286038271668807914583143675"
]
}
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6500eb3a48ac221051b1791818a1ac74744ef617",
"target": {
"file": "security/apparmor/apparmorfs.c"
},
"deprecated": false,
"signature_version": "v1",
"id": "CVE-2022-50074-3c2cb23f",
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"60811421168307444260248195948437246488",
"338085673147948402061055380190214653341",
"319781167269409218367006351681961851356",
"316994777397286038271668807914583143675"
]
}
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@417ea9fe972d2654a268ad66e89c8fcae67017c3",
"target": {
"file": "security/apparmor/apparmorfs.c"
},
"deprecated": false,
"signature_version": "v1",
"id": "CVE-2022-50074-707f73d4",
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"60811421168307444260248195948437246488",
"338085673147948402061055380190214653341",
"319781167269409218367006351681961851356",
"316994777397286038271668807914583143675"
]
}
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@8aab4295582eb397a125d2788b829fa62b88dbf7",
"target": {
"file": "security/apparmor/apparmorfs.c"
},
"deprecated": false,
"signature_version": "v1",
"id": "CVE-2022-50074-7cbe68b3",
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"60811421168307444260248195948437246488",
"338085673147948402061055380190214653341",
"319781167269409218367006351681961851356",
"316994777397286038271668807914583143675"
]
}
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6583edbf459de2e06b9759f264c0ae27e452b97a",
"target": {
"file": "security/apparmor/apparmorfs.c"
},
"deprecated": false,
"signature_version": "v1",
"id": "CVE-2022-50074-b547fac6",
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"60811421168307444260248195948437246488",
"338085673147948402061055380190214653341",
"319781167269409218367006351681961851356",
"316994777397286038271668807914583143675"
]
}
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7db182a2ebeefded86fea542fcc5d6a68bb77f58",
"target": {
"file": "security/apparmor/apparmorfs.c"
},
"deprecated": false,
"signature_version": "v1",
"id": "CVE-2022-50074-d54e0b8d",
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"60811421168307444260248195948437246488",
"338085673147948402061055380190214653341",
"319781167269409218367006351681961851356",
"316994777397286038271668807914583143675"
]
}
}
]