CVE-2022-49906

In the Linux kernel, the following vulnerability has been resolved: ibmvnic: Free rwi on reset success Free the rwi structure in the event that the last rwi in the list processed successfully. The logic in commit 4f408e1fa6e1 ("ibmvnic: retry reset if there are no other resets") introduces an issue that results in a 32 byte memory leak whenever the last rwi in the list gets processed.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

07 May 2025, 13:30

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*
First Time Linux linux Kernel
Linux
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE CWE-401
References () https://git.kernel.org/stable/c/535b78739ae75f257c894a05b1afa86ad9a3669e - () https://git.kernel.org/stable/c/535b78739ae75f257c894a05b1afa86ad9a3669e - Patch
References () https://git.kernel.org/stable/c/c3543a287cfba9105dcc4bb41eb817f51266caaf - () https://git.kernel.org/stable/c/c3543a287cfba9105dcc4bb41eb817f51266caaf - Patch
References () https://git.kernel.org/stable/c/d6dd2fe71153f0ff748bf188bd4af076fe09a0a6 - () https://git.kernel.org/stable/c/d6dd2fe71153f0ff748bf188bd4af076fe09a0a6 - Patch

01 May 2025, 15:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-01 15:16

Updated : 2025-05-07 13:30


NVD link : CVE-2022-49906

Mitre link : CVE-2022-49906


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-401

Missing Release of Memory after Effective Lifetime