In the Linux kernel, the following vulnerability has been resolved:
crypto: qat - fix memory leak in RSA
When an RSA key represented in form 2 (as defined in PKCS #1 V2.1) is
used, some components of the private key persist even after the TFM is
released.
Replace the explicit calls to free the buffers in qat_rsa_exit_tfm()
with a call to qat_rsa_clear_ctx() which frees all buffers referenced in
the TFM context.
References
Configurations
Configuration 1 (hide)
|
History
10 Mar 2025, 21:19
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References | () https://git.kernel.org/stable/c/0f967fdc09955221a1951a279481b0bf4d359941 - Patch | |
References | () https://git.kernel.org/stable/c/80a52e1ee7757b742f96bfb0d58f0c14eb6583d0 - Patch | |
References | () https://git.kernel.org/stable/c/a843925e0287eebb4aa808666bf22c664dfe4c53 - Patch | |
First Time |
Linux
Linux linux Kernel |
|
CWE | CWE-401 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
26 Feb 2025, 07:01
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-26 07:01
Updated : 2025-03-10 21:19
NVD link : CVE-2022-49566
Mitre link : CVE-2022-49566
CVE.ORG link : CVE-2022-49566
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-401
Missing Release of Memory after Effective Lifetime