CVE-2022-50765
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
24/12/2025
Última modificación:
24/12/2025
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
RISC-V: kexec: Fix memory leak of elf header buffer<br />
<br />
This is reported by kmemleak detector:<br />
<br />
unreferenced object 0xff2000000403d000 (size 4096):<br />
comm "kexec", pid 146, jiffies 4294900633 (age 64.792s)<br />
hex dump (first 32 bytes):<br />
7f 45 4c 46 02 01 01 00 00 00 00 00 00 00 00 00 .ELF............<br />
04 00 f3 00 01 00 00 00 00 00 00 00 00 00 00 00 ................<br />
backtrace:<br />
[] kmemleak_vmalloc+0x3c/0xbe<br />
[] __vmalloc_node_range+0x3ac/0x560<br />
[] __vmalloc_node+0x56/0x62<br />
[] vzalloc+0x2c/0x34<br />
[] crash_prepare_elf64_headers+0x80/0x30c<br />
[] elf_kexec_load+0x3e8/0x4ec<br />
[] kexec_image_load_default+0x40/0x4c<br />
[] sys_kexec_file_load+0x1c4/0x322<br />
[] ret_from_syscall+0x0/0x2<br />
<br />
In elf_kexec_load(), a buffer is allocated via vzalloc() to store elf<br />
headers. While it&#39;s not freed back to system when kdump kernel is<br />
reloaded or unloaded, or when image->elf_header is successfully set and<br />
then fails to load kdump kernel for some reason. Fix it by freeing the<br />
buffer in arch_kimage_file_post_load_cleanup().



