We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2022-49853

net: macvlan: fix memory leaks of macvlan_common_newlink



Description

In the Linux kernel, the following vulnerability has been resolved: net: macvlan: fix memory leaks of macvlan_common_newlink kmemleak reports memory leaks in macvlan_common_newlink, as follows: ip link add link eth0 name .. type macvlan mode source macaddr add <MAC-ADDR> kmemleak reports: unreferenced object 0xffff8880109bb140 (size 64): comm "ip", pid 284, jiffies 4294986150 (age 430.108s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 b8 aa 5a 12 80 88 ff ff ..........Z..... 80 1b fa 0d 80 88 ff ff 1e ff ac af c7 c1 6b 6b ..............kk backtrace: [<ffffffff813e06a7>] kmem_cache_alloc_trace+0x1c7/0x300 [<ffffffff81b66025>] macvlan_hash_add_source+0x45/0xc0 [<ffffffff81b66a67>] macvlan_changelink_sources+0xd7/0x170 [<ffffffff81b6775c>] macvlan_common_newlink+0x38c/0x5a0 [<ffffffff81b6797e>] macvlan_newlink+0xe/0x20 [<ffffffff81d97f8f>] __rtnl_newlink+0x7af/0xa50 [<ffffffff81d98278>] rtnl_newlink+0x48/0x70 ... In the scenario where the macvlan mode is configured as 'source', macvlan_changelink_sources() will be execured to reconfigure list of remote source mac addresses, at the same time, if register_netdevice() return an error, the resource generated by macvlan_changelink_sources() is not cleaned up. Using this patch, in the case of an error, it will execute macvlan_flush_sources() to ensure that the resource is cleaned up.

Reserved 2025-05-01 | Published 2025-05-01 | Updated 2025-05-04 | Assigner Linux

Product status

Default status
unaffected

aa5fd0fb77486b8a6764ead8627baa14790e4280 before 9f288e338be206713d79b29144c27fca4503c39b
affected

aa5fd0fb77486b8a6764ead8627baa14790e4280 before 21d3a8b6a1e39e7529ce9de07316ee13a63f305b
affected

aa5fd0fb77486b8a6764ead8627baa14790e4280 before a81b44d1df1f07f00c0dcc0a0b3d2fa24a46289e
affected

aa5fd0fb77486b8a6764ead8627baa14790e4280 before 685e73e3f7a9fb75cbf049a9d0b7c45cc6b57b2e
affected

aa5fd0fb77486b8a6764ead8627baa14790e4280 before 956e0216a19994443c90ba2ea6b0b284c9c4f9cb
affected

aa5fd0fb77486b8a6764ead8627baa14790e4280 before a8d67367ab33604326cc37ab44fd1801bf5691ba
affected

aa5fd0fb77486b8a6764ead8627baa14790e4280 before 9ea003c4671b2fc455320ecf6d4a43b0a3c1878a
affected

aa5fd0fb77486b8a6764ead8627baa14790e4280 before 23569b5652ee8e8e55a12f7835f59af6f3cefc30
affected

Default status
affected

4.9
affected

Any version before 4.9
unaffected

4.9.334
unaffected

4.14.300
unaffected

4.19.267
unaffected

5.4.225
unaffected

5.10.155
unaffected

5.15.79
unaffected

6.0.9
unaffected

6.1
unaffected

References

git.kernel.org/...c/9f288e338be206713d79b29144c27fca4503c39b

git.kernel.org/...c/21d3a8b6a1e39e7529ce9de07316ee13a63f305b

git.kernel.org/...c/a81b44d1df1f07f00c0dcc0a0b3d2fa24a46289e

git.kernel.org/...c/685e73e3f7a9fb75cbf049a9d0b7c45cc6b57b2e

git.kernel.org/...c/956e0216a19994443c90ba2ea6b0b284c9c4f9cb

git.kernel.org/...c/a8d67367ab33604326cc37ab44fd1801bf5691ba

git.kernel.org/...c/9ea003c4671b2fc455320ecf6d4a43b0a3c1878a

git.kernel.org/...c/23569b5652ee8e8e55a12f7835f59af6f3cefc30

cve.org (CVE-2022-49853)

nvd.nist.gov (CVE-2022-49853)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2022-49853

Support options

Helpdesk Chat, Email, Knowledgebase