CVE-2022-49959
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
18/06/2025
Last modified:
18/06/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
openvswitch: fix memory leak at failed datapath creation<br />
<br />
ovs_dp_cmd_new()->ovs_dp_change()->ovs_dp_set_upcall_portids()<br />
allocates array via kmalloc.<br />
If for some reason new_vport() fails during ovs_dp_cmd_new()<br />
dp->upcall_portids must be freed.<br />
Add missing kfree.<br />
<br />
Kmemleak example:<br />
unreferenced object 0xffff88800c382500 (size 64):<br />
comm "dump_state", pid 323, jiffies 4294955418 (age 104.347s)<br />
hex dump (first 32 bytes):<br />
5e c2 79 e4 1f 7a 38 c7 09 21 38 0c 80 88 ff ff ^.y..z8..!8.....<br />
03 00 00 00 0a 00 00 00 14 00 00 00 28 00 00 00 ............(...<br />
backtrace:<br />
[] ovs_dp_set_upcall_portids+0x38/0xa0<br />
[] ovs_dp_change+0x63/0xe0<br />
[] ovs_dp_cmd_new+0x1f0/0x380<br />
[] genl_family_rcv_msg_doit+0xea/0x150<br />
[] genl_rcv_msg+0xdc/0x1e0<br />
[] netlink_rcv_skb+0x50/0x100<br />
[] genl_rcv+0x24/0x40<br />
[] netlink_unicast+0x23e/0x360<br />
[] netlink_sendmsg+0x24e/0x4b0<br />
[] sock_sendmsg+0x62/0x70<br />
[] ____sys_sendmsg+0x230/0x270<br />
[] ___sys_sendmsg+0x88/0xd0<br />
[] __sys_sendmsg+0x59/0xa0<br />
[] do_syscall_64+0x3b/0x90<br />
[] entry_SYSCALL_64_after_hwframe+0x63/0xcd