Home

Description

In the Linux kernel, the following vulnerability has been resolved: xfrm: Update ipcomp_scratches with NULL when freed Currently if ipcomp_alloc_scratches() fails to allocate memory ipcomp_scratches holds obsolete address. So when we try to free the percpu scratches using ipcomp_free_scratches() it tries to vfree non existent vm area. Described below: static void * __percpu *ipcomp_alloc_scratches(void) { ... scratches = alloc_percpu(void *); if (!scratches) return NULL; ipcomp_scratches does not know about this allocation failure. Therefore holding the old obsolete address. ... } So when we free, static void ipcomp_free_scratches(void) { ... scratches = ipcomp_scratches; Assigning obsolete address from ipcomp_scratches if (!scratches) return; for_each_possible_cpu(i) vfree(*per_cpu_ptr(scratches, i)); Trying to free non existent page, causing warning: trying to vfree existent vm area. ... } Fix this breakage by updating ipcomp_scrtches with NULL when scratches is freed

PUBLISHED Reserved 2025-10-22 | Published 2025-10-22 | Updated 2025-10-22 | Assigner Linux

Product status

Default status
unaffected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before debca61df6bc2f65e020656c9c5b878d6b38d30f
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before a39f456d62810c0efb43cead22f98d95b53e4b1a
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 1e8abde895b3ac6a368cbdb372e8800c49e73a28
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 18373ed500f7cd53e24d9b0bd0f1c09d78dba87e
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before be81c44242b20fc3bdcc73480ef8aaee56f5d0b6
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 03155680191ef0f004b1d6a5714c5b8cd271ab61
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before f3bdba4440d82e0da2b1bfc35d3836c8a8e00677
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 2c19945ce8095d065df550e7fe350cd5cc40c6e6
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 8a04d2fc700f717104bfb95b0f6694e448a4537f
affected

Default status
affected

4.9.331 (semver)
unaffected

4.14.296 (semver)
unaffected

4.19.262 (semver)
unaffected

5.4.220 (semver)
unaffected

5.10.150 (semver)
unaffected

5.15.75 (semver)
unaffected

5.19.17 (semver)
unaffected

6.0.3 (semver)
unaffected

6.1 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/debca61df6bc2f65e020656c9c5b878d6b38d30f

git.kernel.org/...c/a39f456d62810c0efb43cead22f98d95b53e4b1a

git.kernel.org/...c/1e8abde895b3ac6a368cbdb372e8800c49e73a28

git.kernel.org/...c/18373ed500f7cd53e24d9b0bd0f1c09d78dba87e

git.kernel.org/...c/be81c44242b20fc3bdcc73480ef8aaee56f5d0b6

git.kernel.org/...c/03155680191ef0f004b1d6a5714c5b8cd271ab61

git.kernel.org/...c/f3bdba4440d82e0da2b1bfc35d3836c8a8e00677

git.kernel.org/...c/2c19945ce8095d065df550e7fe350cd5cc40c6e6

git.kernel.org/...c/8a04d2fc700f717104bfb95b0f6694e448a4537f

cve.org (CVE-2022-50569)

nvd.nist.gov (CVE-2022-50569)

Download JSON