CVE-2022-49256

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
26/02/2025
Last modified:
22/09/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> watch_queue: Actually free the watch<br /> <br /> free_watch() does everything barring actually freeing the watch object. Fix<br /> this by adding the missing kfree.<br /> <br /> kmemleak produces a report something like the following. Note that as an<br /> address can be seen in the first word, the watch would appear to have gone<br /> through call_rcu().<br /> <br /> BUG: memory leak<br /> unreferenced object 0xffff88810ce4a200 (size 96):<br /> comm "syz-executor352", pid 3605, jiffies 4294947473 (age 13.720s)<br /> hex dump (first 32 bytes):<br /> e0 82 48 0d 81 88 ff ff 00 00 00 00 00 00 00 00 ..H.............<br /> 80 a2 e4 0c 81 88 ff ff 00 00 00 00 00 00 00 00 ................<br /> backtrace:<br /> [] kmalloc include/linux/slab.h:581 [inline]<br /> [] kzalloc include/linux/slab.h:714 [inline]<br /> [] keyctl_watch_key+0xec/0x2e0 security/keys/keyctl.c:1800<br /> [] __do_sys_keyctl+0x3c4/0x490 security/keys/keyctl.c:2016<br /> [] do_syscall_x64 arch/x86/entry/common.c:50 [inline]<br /> [] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80<br /> [] entry_SYSCALL_64_after_hwframe+0x44/0xae

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.8 (including) 5.10.110 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.33 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 5.16.19 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.17 (including) 5.17.2 (excluding)