CVE-2022-49566

Source
https://cve.org/CVERecord?id=CVE-2022-49566
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49566.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49566
Downstream
Related
Published
2025-02-26T02:23:11.749Z
Modified
2026-03-12T03:25:26.445299Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
crypto: qat - fix memory leak in RSA
Details

In the Linux kernel, the following vulnerability has been resolved:

crypto: qat - fix memory leak in RSA

When an RSA key represented in form 2 (as defined in PKCS #1 V2.1) is used, some components of the private key persist even after the TFM is released. Replace the explicit calls to free the buffers in qatrsaexittfm() with a call to qatrsaclearctx() which frees all buffers referenced in the TFM context.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49566.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
879f77e9071f029e1c9bd5a75814ecf51370f846
Fixed
a843925e0287eebb4aa808666bf22c664dfe4c53
Fixed
0f967fdc09955221a1951a279481b0bf4d359941
Fixed
80a52e1ee7757b742f96bfb0d58f0c14eb6583d0

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49566.json"