In the Linux kernel, the following vulnerability has been resolved:
ima: fix reference leak in asymmetric_verify()
Don't leak a reference to the key if its algorithm is unknown.
{ "vanir_signatures": [ { "signature_version": "v1", "digest": { "length": 1197.0, "function_hash": "8052089880499931427338839040188009419" }, "id": "CVE-2022-48831-3126c1dc", "deprecated": false, "target": { "file": "security/integrity/digsig_asymmetric.c", "function": "asymmetric_verify" }, "signature_type": "Function", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0838d6d68182f0b28a5434bc6d50727c4757e35b" }, { "signature_version": "v1", "digest": { "length": 1197.0, "function_hash": "8052089880499931427338839040188009419" }, "id": "CVE-2022-48831-d1b48d6e", "deprecated": false, "target": { "file": "security/integrity/digsig_asymmetric.c", "function": "asymmetric_verify" }, "signature_type": "Function", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@926fd9f23b27ca6587492c3f58f4c7f4cd01dad5" }, { "signature_version": "v1", "digest": { "threshold": 0.9, "line_hashes": [ "165181651406495337060742347267139827640", "57895297033500067006156381899269088393", "87518421080827079004527637030161364142", "187797553276972267500841793096129180491", "175481132813434670287070635682966532310", "174613814635862324025201258825987469435", "298126376253181122262609880192198891899", "262633891891198740551295388491348691062", "328931230286018214554063804027560002347", "273368267840084248945733071949776375828", "307240864581471844342906563874394823976", "185889615368510371377276245623998986902", "198086700539896322955245820677690838956", "229386476926545909295085123103263115044", "219393745128093848900256476258169417608", "224468335340725167726786151981742660961", "59549511137353279212069264313374856030" ] }, "id": "CVE-2022-48831-d4731109", "deprecated": false, "target": { "file": "security/integrity/digsig_asymmetric.c" }, "signature_type": "Line", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0838d6d68182f0b28a5434bc6d50727c4757e35b" }, { "signature_version": "v1", "digest": { "threshold": 0.9, "line_hashes": [ "165181651406495337060742347267139827640", "57895297033500067006156381899269088393", "87518421080827079004527637030161364142", "187797553276972267500841793096129180491", "175481132813434670287070635682966532310", "174613814635862324025201258825987469435", "298126376253181122262609880192198891899", "262633891891198740551295388491348691062", "328931230286018214554063804027560002347", "273368267840084248945733071949776375828", "307240864581471844342906563874394823976", "185889615368510371377276245623998986902", "198086700539896322955245820677690838956", "229386476926545909295085123103263115044", "219393745128093848900256476258169417608", "224468335340725167726786151981742660961", "59549511137353279212069264313374856030" ] }, "id": "CVE-2022-48831-e0358a76", "deprecated": false, "target": { "file": "security/integrity/digsig_asymmetric.c" }, "signature_type": "Line", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@926fd9f23b27ca6587492c3f58f4c7f4cd01dad5" } ] }