CVE-2022-49080

In the Linux kernel, the following vulnerability has been resolved: mm/mempolicy: fix mpol_new leak in shared_policy_replace If mpol_new is allocated but not used in restart loop, mpol_new will be freed via mpol_put before returning to the caller. But refcnt is not initialized yet, so mpol_put could not do the right things and might leak the unused mpol_new. This would happen if mempolicy was updated on the shared shmem file while the sp->lock has been dropped during the memory allocation. This issue could be triggered easily with the below code snippet if there are many processes doing the below work at the same time: shmid = shmget((key_t)5566, 1024 * PAGE_SIZE, 0666|IPC_CREAT); shm = shmat(shmid, 0, 0); loop many times { mbind(shm, 1024 * PAGE_SIZE, MPOL_LOCAL, mask, maxnode, 0); mbind(shm + 128 * PAGE_SIZE, 128 * PAGE_SIZE, MPOL_DEFAULT, mask, maxnode, 0); }
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.8:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.8:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.8:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.8:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.8:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.8:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.8:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.18:rc1:*:*:*:*:*:*

History

23 Sep 2025, 18:32

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:3.8:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.18:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.8:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.8:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.8:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.8:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.8:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.8:rc7:*:*:*:*:*:*
First Time Linux linux Kernel
Linux
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/198932a14aeb19a15cf19e51e151d023bc4cd648 - () https://git.kernel.org/stable/c/198932a14aeb19a15cf19e51e151d023bc4cd648 - Patch
References () https://git.kernel.org/stable/c/25f506273b6ae806fd46bfcb6fdaa5b9ec81a05b - () https://git.kernel.org/stable/c/25f506273b6ae806fd46bfcb6fdaa5b9ec81a05b - Patch
References () https://git.kernel.org/stable/c/39a32f3c06f6d68a530bf9612afa19f50f12e93d - () https://git.kernel.org/stable/c/39a32f3c06f6d68a530bf9612afa19f50f12e93d - Patch
References () https://git.kernel.org/stable/c/4ad099559b00ac01c3726e5c95dc3108ef47d03e - () https://git.kernel.org/stable/c/4ad099559b00ac01c3726e5c95dc3108ef47d03e - Patch
References () https://git.kernel.org/stable/c/5e16dc5378abd749a836daa9ee4ab2c8d2668999 - () https://git.kernel.org/stable/c/5e16dc5378abd749a836daa9ee4ab2c8d2668999 - Patch
References () https://git.kernel.org/stable/c/6e00309ac716fa8225f0cbde2cd9c24f0e74ee21 - () https://git.kernel.org/stable/c/6e00309ac716fa8225f0cbde2cd9c24f0e74ee21 - Patch
References () https://git.kernel.org/stable/c/8510c2346d9e47a72b7f018a36ef0c39483e53d6 - () https://git.kernel.org/stable/c/8510c2346d9e47a72b7f018a36ef0c39483e53d6 - Patch
References () https://git.kernel.org/stable/c/f7e183b0a7136b6dc9c7b9b2a85a608a8feba894 - () https://git.kernel.org/stable/c/f7e183b0a7136b6dc9c7b9b2a85a608a8feba894 - Patch
References () https://git.kernel.org/stable/c/fe39ac59dbbf893b73b24e3184161d0bd06d6651 - () https://git.kernel.org/stable/c/fe39ac59dbbf893b73b24e3184161d0bd06d6651 - Patch
CWE CWE-401
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mm/mempolicy: arregla la fuga de mpol_new en shared_policy_replace Si mpol_new se asigna pero no se usa en el bucle de reinicio, mpol_new se liberará a través de mpol_put antes de regresar al llamador. Pero refcnt aún no se ha inicializado, por lo que mpol_put no podría hacer las cosas correctas y podría filtrar el mpol_new no utilizado. Esto sucedería si mempolicy se actualizara en el archivo shmem compartido mientras se eliminaba sp->lock durante la asignación de memoria. Este problema se podría activar fácilmente con el siguiente fragmento de código si hay muchos procesos haciendo el siguiente trabajo al mismo tiempo: shmid = shmget((key_t)5566, 1024 * PAGE_SIZE, 0666|IPC_CREAT); shm = shmat(shmid, 0, 0); repetir muchas veces { mbind(shm, 1024 * PAGE_SIZE, MPOL_LOCAL, mask, maxnode, 0); mbind(shm + 128 * PAGE_SIZE, 128 * PAGE_SIZE, MPOL_DEFAULT, mask, maxnode, 0); }

26 Feb 2025, 07:00

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-26 07:00

Updated : 2025-09-23 18:32


NVD link : CVE-2022-49080

Mitre link : CVE-2022-49080

CVE.ORG link : CVE-2022-49080


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-401

Missing Release of Memory after Effective Lifetime