In the Linux kernel, the following vulnerability has been resolved:
vdpasim: fix memory leak when freeing IOTLBs
After commit bda324fd037a ("vdpasim: control virtqueue support"), vdpasim->iommu became an array of IOTLB, so we should clean the mappings of each free one by one instead of just deleting the ranges in the first IOTLB which may leak maps.
{
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50263.json",
"cna_assigner": "Linux"
}[
{
"signature_type": "Function",
"signature_version": "v1",
"target": {
"file": "drivers/vdpa/vdpa_sim/vdpa_sim.c",
"function": "vdpasim_free"
},
"id": "CVE-2022-50263-1105d989",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@54b210c90d2803a9f1c8fd2f0d08e90172e9a06d",
"digest": {
"function_hash": "333918264336712517480867878513633913265",
"length": 456.0
}
},
{
"signature_type": "Function",
"signature_version": "v1",
"target": {
"file": "drivers/vdpa/vdpa_sim/vdpa_sim.c",
"function": "vdpasim_free"
},
"id": "CVE-2022-50263-3bb19ffc",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0b7a04a30eef20e6b24926a45c0ce7906ae85bd6",
"digest": {
"function_hash": "333918264336712517480867878513633913265",
"length": 456.0
}
},
{
"signature_type": "Function",
"signature_version": "v1",
"target": {
"file": "drivers/vdpa/vdpa_sim/vdpa_sim.c",
"function": "vdpasim_free"
},
"id": "CVE-2022-50263-3bc29fae",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@16b22e27fba6fd816d0dcb98f42cc71f0836c27e",
"digest": {
"function_hash": "333918264336712517480867878513633913265",
"length": 456.0
}
},
{
"signature_type": "Line",
"signature_version": "v1",
"target": {
"file": "drivers/vdpa/vdpa_sim/vdpa_sim.c"
},
"id": "CVE-2022-50263-63ba6031",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@54b210c90d2803a9f1c8fd2f0d08e90172e9a06d",
"digest": {
"line_hashes": [
"57380116063989674936659022585566995665",
"192551892348273382062178590262957707594",
"295285049557493632789870894104098633922",
"265754374884052691363827184306977621432"
],
"threshold": 0.9
}
},
{
"signature_type": "Line",
"signature_version": "v1",
"target": {
"file": "drivers/vdpa/vdpa_sim/vdpa_sim.c"
},
"id": "CVE-2022-50263-7f04be45",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@16b22e27fba6fd816d0dcb98f42cc71f0836c27e",
"digest": {
"line_hashes": [
"57380116063989674936659022585566995665",
"192551892348273382062178590262957707594",
"295285049557493632789870894104098633922",
"265754374884052691363827184306977621432"
],
"threshold": 0.9
}
},
{
"signature_type": "Line",
"signature_version": "v1",
"target": {
"file": "drivers/vdpa/vdpa_sim/vdpa_sim.c"
},
"id": "CVE-2022-50263-83f79efd",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0b7a04a30eef20e6b24926a45c0ce7906ae85bd6",
"digest": {
"line_hashes": [
"57380116063989674936659022585566995665",
"192551892348273382062178590262957707594",
"295285049557493632789870894104098633922",
"265754374884052691363827184306977621432"
],
"threshold": 0.9
}
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50263.json"