We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2022-49878

bpf, verifier: Fix memory leak in array reallocation for stack state



Description

In the Linux kernel, the following vulnerability has been resolved: bpf, verifier: Fix memory leak in array reallocation for stack state If an error (NULL) is returned by krealloc(), callers of realloc_array() were setting their allocation pointers to NULL, but on error krealloc() does not touch the original allocation. This would result in a memory resource leak. Instead, free the old allocation on the error handling path. The memory leak information is as follows as also reported by Zhengchao: unreferenced object 0xffff888019801800 (size 256): comm "bpf_repo", pid 6490, jiffies 4294959200 (age 17.170s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000b211474b>] __kmalloc_node_track_caller+0x45/0xc0 [<0000000086712a0b>] krealloc+0x83/0xd0 [<00000000139aab02>] realloc_array+0x82/0xe2 [<00000000b1ca41d1>] grow_stack_state+0xfb/0x186 [<00000000cd6f36d2>] check_mem_access.cold+0x141/0x1341 [<0000000081780455>] do_check_common+0x5358/0xb350 [<0000000015f6b091>] bpf_check.cold+0xc3/0x29d [<000000002973c690>] bpf_prog_load+0x13db/0x2240 [<00000000028d1644>] __sys_bpf+0x1605/0x4ce0 [<00000000053f29bd>] __x64_sys_bpf+0x75/0xb0 [<0000000056fedaf5>] do_syscall_64+0x35/0x80 [<000000002bd58261>] entry_SYSCALL_64_after_hwframe+0x63/0xcd

Reserved 2025-05-01 | Published 2025-05-01 | Updated 2025-05-04 | Assigner Linux

Product status

Default status
unaffected

c69431aab67a912836e5831f03d99a819c14c9c3 before 06615967d4889b08b19ff3dda96e8b131282f73d
affected

c69431aab67a912836e5831f03d99a819c14c9c3 before 3e210891c4a4c2d858cd6f9f61d5809af251d4df
affected

c69431aab67a912836e5831f03d99a819c14c9c3 before 42378a9ca55347102bbf86708776061d8fe3ece2
affected

Default status
affected

5.14
affected

Any version before 5.14
unaffected

5.15.79
unaffected

6.0.9
unaffected

6.1
unaffected

References

git.kernel.org/...c/06615967d4889b08b19ff3dda96e8b131282f73d

git.kernel.org/...c/3e210891c4a4c2d858cd6f9f61d5809af251d4df

git.kernel.org/...c/42378a9ca55347102bbf86708776061d8fe3ece2

cve.org (CVE-2022-49878)

nvd.nist.gov (CVE-2022-49878)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2022-49878

Support options

Helpdesk Chat, Email, Knowledgebase