In the Linux kernel, the following vulnerability has been resolved:
vdpasim: fix memory leak when freeing IOTLBs
After commit bda324fd037a ("vdpasim: control virtqueue support"), vdpasim->iommu became an array of IOTLB, so we should clean the mappings of each free one by one instead of just deleting the ranges in the first IOTLB which may leak maps.
[
{
"signature_type": "Function",
"deprecated": false,
"digest": {
"function_hash": "333918264336712517480867878513633913265",
"length": 456.0
},
"signature_version": "v1",
"id": "CVE-2022-50263-1105d989",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@54b210c90d2803a9f1c8fd2f0d08e90172e9a06d",
"target": {
"function": "vdpasim_free",
"file": "drivers/vdpa/vdpa_sim/vdpa_sim.c"
}
},
{
"signature_type": "Function",
"deprecated": false,
"digest": {
"function_hash": "333918264336712517480867878513633913265",
"length": 456.0
},
"signature_version": "v1",
"id": "CVE-2022-50263-3bb19ffc",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0b7a04a30eef20e6b24926a45c0ce7906ae85bd6",
"target": {
"function": "vdpasim_free",
"file": "drivers/vdpa/vdpa_sim/vdpa_sim.c"
}
},
{
"signature_type": "Function",
"deprecated": false,
"digest": {
"function_hash": "333918264336712517480867878513633913265",
"length": 456.0
},
"signature_version": "v1",
"id": "CVE-2022-50263-3bc29fae",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@16b22e27fba6fd816d0dcb98f42cc71f0836c27e",
"target": {
"function": "vdpasim_free",
"file": "drivers/vdpa/vdpa_sim/vdpa_sim.c"
}
},
{
"signature_type": "Line",
"deprecated": false,
"digest": {
"threshold": 0.9,
"line_hashes": [
"57380116063989674936659022585566995665",
"192551892348273382062178590262957707594",
"295285049557493632789870894104098633922",
"265754374884052691363827184306977621432"
]
},
"signature_version": "v1",
"id": "CVE-2022-50263-63ba6031",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@54b210c90d2803a9f1c8fd2f0d08e90172e9a06d",
"target": {
"file": "drivers/vdpa/vdpa_sim/vdpa_sim.c"
}
},
{
"signature_type": "Line",
"deprecated": false,
"digest": {
"threshold": 0.9,
"line_hashes": [
"57380116063989674936659022585566995665",
"192551892348273382062178590262957707594",
"295285049557493632789870894104098633922",
"265754374884052691363827184306977621432"
]
},
"signature_version": "v1",
"id": "CVE-2022-50263-7f04be45",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@16b22e27fba6fd816d0dcb98f42cc71f0836c27e",
"target": {
"file": "drivers/vdpa/vdpa_sim/vdpa_sim.c"
}
},
{
"signature_type": "Line",
"deprecated": false,
"digest": {
"threshold": 0.9,
"line_hashes": [
"57380116063989674936659022585566995665",
"192551892348273382062178590262957707594",
"295285049557493632789870894104098633922",
"265754374884052691363827184306977621432"
]
},
"signature_version": "v1",
"id": "CVE-2022-50263-83f79efd",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0b7a04a30eef20e6b24926a45c0ce7906ae85bd6",
"target": {
"file": "drivers/vdpa/vdpa_sim/vdpa_sim.c"
}
}
]