We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2022-49800

tracing: Fix memory leak in test_gen_synth_cmd() and test_empty_synth_event()



Description

In the Linux kernel, the following vulnerability has been resolved: tracing: Fix memory leak in test_gen_synth_cmd() and test_empty_synth_event() test_gen_synth_cmd() only free buf in fail path, hence buf will leak when there is no failure. Add kfree(buf) to prevent the memleak. The same reason and solution in test_empty_synth_event(). unreferenced object 0xffff8881127de000 (size 2048): comm "modprobe", pid 247, jiffies 4294972316 (age 78.756s) hex dump (first 32 bytes): 20 67 65 6e 5f 73 79 6e 74 68 5f 74 65 73 74 20 gen_synth_test 20 70 69 64 5f 74 20 6e 65 78 74 5f 70 69 64 5f pid_t next_pid_ backtrace: [<000000004254801a>] kmalloc_trace+0x26/0x100 [<0000000039eb1cf5>] 0xffffffffa00083cd [<000000000e8c3bc8>] 0xffffffffa00086ba [<00000000c293d1ea>] do_one_initcall+0xdb/0x480 [<00000000aa189e6d>] do_init_module+0x1cf/0x680 [<00000000d513222b>] load_module+0x6a50/0x70a0 [<000000001fd4d529>] __do_sys_finit_module+0x12f/0x1c0 [<00000000b36c4c0f>] do_syscall_64+0x3f/0x90 [<00000000bbf20cf3>] entry_SYSCALL_64_after_hwframe+0x63/0xcd unreferenced object 0xffff8881127df000 (size 2048): comm "modprobe", pid 247, jiffies 4294972324 (age 78.728s) hex dump (first 32 bytes): 20 65 6d 70 74 79 5f 73 79 6e 74 68 5f 74 65 73 empty_synth_tes 74 20 20 70 69 64 5f 74 20 6e 65 78 74 5f 70 69 t pid_t next_pi backtrace: [<000000004254801a>] kmalloc_trace+0x26/0x100 [<00000000d4db9a3d>] 0xffffffffa0008071 [<00000000c31354a5>] 0xffffffffa00086ce [<00000000c293d1ea>] do_one_initcall+0xdb/0x480 [<00000000aa189e6d>] do_init_module+0x1cf/0x680 [<00000000d513222b>] load_module+0x6a50/0x70a0 [<000000001fd4d529>] __do_sys_finit_module+0x12f/0x1c0 [<00000000b36c4c0f>] do_syscall_64+0x3f/0x90 [<00000000bbf20cf3>] entry_SYSCALL_64_after_hwframe+0x63/0xcd

Reserved 2025-05-01 | Published 2025-05-01 | Updated 2025-05-04 | Assigner Linux

Product status

Default status
unaffected

9fe41efaca08416657efa8731c0d47ccb6a3f3eb before 65ba7e7c241122ef0a9e61d1920f2ae9689aa796
affected

9fe41efaca08416657efa8731c0d47ccb6a3f3eb before 07ba4f0603aba288580866394f2916dfe55823a2
affected

9fe41efaca08416657efa8731c0d47ccb6a3f3eb before 0e5baaa181a052d968701bb9c5b1d55847f00942
affected

9fe41efaca08416657efa8731c0d47ccb6a3f3eb before a4527fef9afe5c903c718d0cd24609fe9c754250
affected

Default status
affected

5.6
affected

Any version before 5.6
unaffected

5.10.156
unaffected

5.15.80
unaffected

6.0.10
unaffected

6.1
unaffected

References

git.kernel.org/...c/65ba7e7c241122ef0a9e61d1920f2ae9689aa796

git.kernel.org/...c/07ba4f0603aba288580866394f2916dfe55823a2

git.kernel.org/...c/0e5baaa181a052d968701bb9c5b1d55847f00942

git.kernel.org/...c/a4527fef9afe5c903c718d0cd24609fe9c754250

cve.org (CVE-2022-49800)

nvd.nist.gov (CVE-2022-49800)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2022-49800

Support options

Helpdesk Chat, Email, Knowledgebase