First published: Thu May 01 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: tracing: kprobe: Fix memory leak in test_gen_kprobe/kretprobe_cmd() test_gen_kprobe_cmd() only free buf in fail path, hence buf will leak when there is no failure. Move kfree(buf) from fail path to common path to prevent the memleak. The same reason and solution in test_gen_kretprobe_cmd(). unreferenced object 0xffff888143b14000 (size 2048): comm "insmod", pid 52490, jiffies 4301890980 (age 40.553s) hex dump (first 32 bytes): 70 3a 6b 70 72 6f 62 65 73 2f 67 65 6e 5f 6b 70 p:kprobes/gen_kp 72 6f 62 65 5f 74 65 73 74 20 64 6f 5f 73 79 73 robe_test do_sys backtrace: [<000000006d7b836b>] kmalloc_trace+0x27/0xa0 [<0000000009528b5b>] 0xffffffffa059006f [<000000008408b580>] do_one_initcall+0x87/0x2a0 [<00000000c4980a7e>] do_init_module+0xdf/0x320 [<00000000d775aad0>] load_module+0x3006/0x3390 [<00000000e9a74b80>] __do_sys_finit_module+0x113/0x1b0 [<000000003726480d>] do_syscall_64+0x35/0x80 [<000000003441e93b>] entry_SYSCALL_64_after_hwframe+0x46/0xb0
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=5.6<5.10.154 | |
Linux Kernel | >=5.11<5.15.78 | |
Linux Kernel | >=5.16<6.0.8 | |
Linux Kernel | =6.1-rc1 | |
Linux Kernel | =6.1-rc2 | |
Linux Kernel | =6.1-rc3 | |
Linux kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-49891 has a moderate severity level due to potential memory leaks leading to resource exhaustion.
To fix CVE-2022-49891, update your Linux kernel to the version that includes the patch for this vulnerability.
CVE-2022-49891 affects various versions of the Linux kernel that utilize the kprobe feature.
CVE-2022-49891 is a memory leak vulnerability specifically related to kernel tracing in the Linux kernel.
CVE-2022-49891 is not considered remotely exploitable as it requires local access to trigger the memory leak.