In the Linux kernel, the following vulnerability has been resolved:
mm/mempolicy: fix memory leak in setmempolicyhome_node system call
When encountering any vma in the range with policy other than MPOLBIND or MPOLPREFERREDMANY, an error is returned without issuing a mpolput on the policy just allocated with mpol_dup().
This allows arbitrary users to leak kernel memory.
{ "vanir_signatures": [ { "deprecated": false, "signature_type": "Function", "target": { "file": "mm/mempolicy.c", "function": "SYSCALL_DEFINE4" }, "signature_version": "v1", "digest": { "length": 1162.0, "function_hash": "161196312206971867612450849472863779543" }, "id": "CVE-2022-50391-186670f7", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4ca0eb6b2f3add8c5daefb726ce57dc95d103d33" }, { "deprecated": false, "signature_type": "Function", "target": { "file": "mm/mempolicy.c", "function": "SYSCALL_DEFINE4" }, "signature_version": "v1", "digest": { "length": 1120.0, "function_hash": "109979892599940213936209867045044100674" }, "id": "CVE-2022-50391-2384f6d3", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0ce4cc6d269ddc448a825955b495f662f5d9e153" }, { "deprecated": false, "signature_type": "Line", "target": { "file": "mm/mempolicy.c" }, "signature_version": "v1", "digest": { "line_hashes": [ "111201215960665695774032149593468031233", "61298621715229381405017303547034806492", "132430502059530489021592664873062295562", "338384273565592470318402342581124578438" ], "threshold": 0.9 }, "id": "CVE-2022-50391-6ad3a85c", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0ce4cc6d269ddc448a825955b495f662f5d9e153" }, { "deprecated": false, "signature_type": "Function", "target": { "file": "mm/mempolicy.c", "function": "SYSCALL_DEFINE4" }, "signature_version": "v1", "digest": { "length": 1120.0, "function_hash": "109979892599940213936209867045044100674" }, "id": "CVE-2022-50391-bd1ea6c6", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@38ce7c9bdfc228c14d7621ba36d3eebedd9d4f76" }, { "deprecated": false, "signature_type": "Line", "target": { "file": "mm/mempolicy.c" }, "signature_version": "v1", "digest": { "line_hashes": [ "111201215960665695774032149593468031233", "61298621715229381405017303547034806492", "132430502059530489021592664873062295562", "338384273565592470318402342581124578438" ], "threshold": 0.9 }, "id": "CVE-2022-50391-d469a1b2", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@38ce7c9bdfc228c14d7621ba36d3eebedd9d4f76" }, { "deprecated": false, "signature_type": "Line", "target": { "file": "mm/mempolicy.c" }, "signature_version": "v1", "digest": { "line_hashes": [ "111201215960665695774032149593468031233", "61298621715229381405017303547034806492", "132430502059530489021592664873062295562", "338384273565592470318402342581124578438" ], "threshold": 0.9 }, "id": "CVE-2022-50391-efa3c684", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4ca0eb6b2f3add8c5daefb726ce57dc95d103d33" } ] }