CVE-2022-49583

Source
https://cve.org/CVERecord?id=CVE-2022-49583
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49583.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49583
Downstream
Related
Published
2025-02-26T02:23:20.108Z
Modified
2026-03-20T12:24:40.028097Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
iavf: Fix handling of dummy receive descriptors
Details

In the Linux kernel, the following vulnerability has been resolved:

iavf: Fix handling of dummy receive descriptors

Fix memory leak caused by not handling dummy receive descriptor properly. iavfgetrxbuffer now sets the rxbuffer return value for dummy receive descriptors. Without this patch, when the hardware writes a dummy descriptor, iavf would not free the page allocated for the previous receive buffer. This is an unlikely event but can still happen.

[Jesse: massaged commit message]

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49583.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
efa14c3985828da3163f5372137cb64d992b0f79
Fixed
d88d59faf4e6f9cc4767664206afdb999b10ec77
Fixed
c6af94324911ef0846af1a5ce5e049ca736db34b
Fixed
2918419c06088f6709ceb543feb01752779ade4c
Fixed
6edb818732fc05fda495f5b3a749bd1cee01398b
Fixed
a9f49e0060301a9bfebeca76739158d0cf91cdf6
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
2a51e334a0ade539e5b0fcfdbd8b43acb9c7547d
Last affected
833577ecf3451c7306abb48f221d365c2ee4cc1b

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49583.json"