In the Linux kernel, the following vulnerability has been resolved:
vdpa/vpvdpa: fix kfree a wrong pointer in vpvdpa_remove
In vpvdparemove(), the code kfree(&vpvdpamgtdev->mgtdev.id_table) uses a reference of pointer as the argument of kfree, which is the wrong pointer and then may hit crash like this:
Unable to handle kernel paging request at virtual address 00ffff003363e30c Internal error: Oops: 96000004 [#1] SMP Call trace: rbnext+0x20/0x5c ext4readdir+0x494/0x5c4 [ext4] iteratedir+0x168/0x1b4 _sesysgetdents64+0x68/0x170 _arm64sysgetdents64+0x24/0x30 el0svccommon.constprop.0+0x7c/0x1bc doel0svc+0x2c/0x94 el0svc+0x20/0x30 el0synchandler+0xb0/0xb4 el0_sync+0x160/0x180 Code: 54000220 f9400441 b4000161 aa0103e0 (f9400821) SMP: stopping secondary CPUs Starting crashdump kernel...
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50873.json"
}