In the Linux kernel, the following vulnerability has been resolved:
mm/mempolicy: fix memory leak in setmempolicyhome_node system call
When encountering any vma in the range with policy other than MPOLBIND or MPOLPREFERREDMANY, an error is returned without issuing a mpolput on the policy just allocated with mpol_dup().
This allows arbitrary users to leak kernel memory.
[
{
"deprecated": false,
"id": "CVE-2022-50391-186670f7",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4ca0eb6b2f3add8c5daefb726ce57dc95d103d33",
"signature_version": "v1",
"target": {
"function": "SYSCALL_DEFINE4",
"file": "mm/mempolicy.c"
},
"signature_type": "Function",
"digest": {
"function_hash": "161196312206971867612450849472863779543",
"length": 1162.0
}
},
{
"deprecated": false,
"id": "CVE-2022-50391-2384f6d3",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0ce4cc6d269ddc448a825955b495f662f5d9e153",
"signature_version": "v1",
"target": {
"function": "SYSCALL_DEFINE4",
"file": "mm/mempolicy.c"
},
"signature_type": "Function",
"digest": {
"function_hash": "109979892599940213936209867045044100674",
"length": 1120.0
}
},
{
"deprecated": false,
"id": "CVE-2022-50391-6ad3a85c",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0ce4cc6d269ddc448a825955b495f662f5d9e153",
"signature_version": "v1",
"target": {
"file": "mm/mempolicy.c"
},
"signature_type": "Line",
"digest": {
"line_hashes": [
"111201215960665695774032149593468031233",
"61298621715229381405017303547034806492",
"132430502059530489021592664873062295562",
"338384273565592470318402342581124578438"
],
"threshold": 0.9
}
},
{
"deprecated": false,
"id": "CVE-2022-50391-bd1ea6c6",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@38ce7c9bdfc228c14d7621ba36d3eebedd9d4f76",
"signature_version": "v1",
"target": {
"function": "SYSCALL_DEFINE4",
"file": "mm/mempolicy.c"
},
"signature_type": "Function",
"digest": {
"function_hash": "109979892599940213936209867045044100674",
"length": 1120.0
}
},
{
"deprecated": false,
"id": "CVE-2022-50391-d469a1b2",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@38ce7c9bdfc228c14d7621ba36d3eebedd9d4f76",
"signature_version": "v1",
"target": {
"file": "mm/mempolicy.c"
},
"signature_type": "Line",
"digest": {
"line_hashes": [
"111201215960665695774032149593468031233",
"61298621715229381405017303547034806492",
"132430502059530489021592664873062295562",
"338384273565592470318402342581124578438"
],
"threshold": 0.9
}
},
{
"deprecated": false,
"id": "CVE-2022-50391-efa3c684",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4ca0eb6b2f3add8c5daefb726ce57dc95d103d33",
"signature_version": "v1",
"target": {
"file": "mm/mempolicy.c"
},
"signature_type": "Line",
"digest": {
"line_hashes": [
"111201215960665695774032149593468031233",
"61298621715229381405017303547034806492",
"132430502059530489021592664873062295562",
"338384273565592470318402342581124578438"
],
"threshold": 0.9
}
}
]