CVE-2022-49627

Source
https://cve.org/CVERecord?id=CVE-2022-49627
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49627.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49627
Downstream
Related
Published
2025-02-26T02:23:41.763Z
Modified
2026-03-20T12:24:41.965544Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
ima: Fix potential memory leak in ima_init_crypto()
Details

In the Linux kernel, the following vulnerability has been resolved:

ima: Fix potential memory leak in imainitcrypto()

On failure to allocate the SHA1 tfm, IMA fails to initialize and exits without freeing the imaalgoarray. Add the missing kfree() for imaalgoarray to avoid the potential memory leak.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49627.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
6d94809af6b0830c4dfcad661535a5939bcb8a7d
Fixed
c1d9702ceb4a091da6bee380627596d1fba09274
Fixed
601ae26aa2802a4c10c94d7388a99eabdbefab2b
Fixed
830de9667b3ada0a75a3f098dfc7159709fe397b
Fixed
067d2521874135267e681c19d42761c601d503d6

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49627.json"