CVE-2022-50631
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
09/12/2025
Última modificación:
09/12/2025
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
RISC-V: kexec: Fix memory leak of fdt buffer<br />
<br />
This is reported by kmemleak detector:<br />
<br />
unreferenced object 0xff60000082864000 (size 9588):<br />
comm "kexec", pid 146, jiffies 4294900634 (age 64.788s)<br />
hex dump (first 32 bytes):<br />
d0 0d fe ed 00 00 12 ed 00 00 00 48 00 00 11 40 ...........H...@<br />
00 00 00 28 00 00 00 11 00 00 00 02 00 00 00 00 ...(............<br />
backtrace:<br />
[] kmemleak_alloc+0x34/0x3e<br />
[] kmalloc_order+0x9c/0xc4<br />
[] kmalloc_order_trace+0x34/0xb6<br />
[] __kmalloc+0x5c2/0x62a<br />
[] kvmalloc_node+0x66/0xd6<br />
[] of_kexec_alloc_and_setup_fdt+0xa6/0x6ea<br />
[] elf_kexec_load+0x206/0x4ec<br />
[] kexec_image_load_default+0x40/0x4c<br />
[] sys_kexec_file_load+0x1c4/0x322<br />
[] ret_from_syscall+0x0/0x2<br />
<br />
In elf_kexec_load(), a buffer is allocated via kvmalloc() to store fdt.<br />
While it&#39;s not freed back to system when kexec kernel is reloaded or<br />
unloaded. Then memory leak is caused. Fix it by introducing riscv<br />
specific function arch_kimage_file_post_load_cleanup(), and freeing the<br />
buffer there.



