CVE-2022-49080
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
26/02/2025
Last modified:
23/09/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
mm/mempolicy: fix mpol_new leak in shared_policy_replace<br />
<br />
If mpol_new is allocated but not used in restart loop, mpol_new will be<br />
freed via mpol_put before returning to the caller. But refcnt is not<br />
initialized yet, so mpol_put could not do the right things and might<br />
leak the unused mpol_new. This would happen if mempolicy was updated on<br />
the shared shmem file while the sp->lock has been dropped during the<br />
memory allocation.<br />
<br />
This issue could be triggered easily with the below code snippet if<br />
there are many processes doing the below work at the same time:<br />
<br />
shmid = shmget((key_t)5566, 1024 * PAGE_SIZE, 0666|IPC_CREAT);<br />
shm = shmat(shmid, 0, 0);<br />
loop many times {<br />
mbind(shm, 1024 * PAGE_SIZE, MPOL_LOCAL, mask, maxnode, 0);<br />
mbind(shm + 128 * PAGE_SIZE, 128 * PAGE_SIZE, MPOL_DEFAULT, mask,<br />
maxnode, 0);<br />
}
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 3.8.1 (including) | 4.9.311 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.10 (including) | 4.14.276 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.15 (including) | 4.19.238 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.20 (including) | 5.4.189 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.111 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.34 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 5.16.20 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.17 (including) | 5.17.3 (excluding) |
| cpe:2.3:o:linux:linux_kernel:3.8:-:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:3.8:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:3.8:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:3.8:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:3.8:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:3.8:rc6:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:3.8:rc7:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/198932a14aeb19a15cf19e51e151d023bc4cd648
- https://git.kernel.org/stable/c/25f506273b6ae806fd46bfcb6fdaa5b9ec81a05b
- https://git.kernel.org/stable/c/39a32f3c06f6d68a530bf9612afa19f50f12e93d
- https://git.kernel.org/stable/c/4ad099559b00ac01c3726e5c95dc3108ef47d03e
- https://git.kernel.org/stable/c/5e16dc5378abd749a836daa9ee4ab2c8d2668999
- https://git.kernel.org/stable/c/6e00309ac716fa8225f0cbde2cd9c24f0e74ee21
- https://git.kernel.org/stable/c/8510c2346d9e47a72b7f018a36ef0c39483e53d6
- https://git.kernel.org/stable/c/f7e183b0a7136b6dc9c7b9b2a85a608a8feba894
- https://git.kernel.org/stable/c/fe39ac59dbbf893b73b24e3184161d0bd06d6651



