CVE-2022-49648

In the Linux kernel, the following vulnerability has been resolved: tracing/histograms: Fix memory leak problem This reverts commit 46bbe5c671e06f070428b9be142cc4ee5cedebac. As commit 46bbe5c671e0 ("tracing: fix double free") said, the "double free" problem reported by clang static analyzer is: > In parse_var_defs() if there is a problem allocating > var_defs.expr, the earlier var_defs.name is freed. > This free is duplicated by free_var_defs() which frees > the rest of the list. However, if there is a problem allocating N-th var_defs.expr: + in parse_var_defs(), the freed 'earlier var_defs.name' is actually the N-th var_defs.name; + then in free_var_defs(), the names from 0th to (N-1)-th are freed; IF ALLOCATING PROBLEM HAPPENED HERE!!! -+ \ | 0th 1th (N-1)-th N-th V +-------------+-------------+-----+-------------+----------- var_defs: | name | expr | name | expr | ... | name | expr | name | /// +-------------+-------------+-----+-------------+----------- These two frees don't act on same name, so there was no "double free" problem before. Conversely, after that commit, we get a "memory leak" problem because the above "N-th var_defs.name" is not freed. If enable CONFIG_DEBUG_KMEMLEAK and inject a fault at where the N-th var_defs.expr allocated, then execute on shell like: $ echo 'hist:key=call_site:val=$v1,$v2:v1=bytes_req,v2=bytes_alloc' > \ /sys/kernel/debug/tracing/events/kmem/kmalloc/trigger Then kmemleak reports: unreferenced object 0xffff8fb100ef3518 (size 8): comm "bash", pid 196, jiffies 4295681690 (age 28.538s) hex dump (first 8 bytes): 76 31 00 00 b1 8f ff ff v1...... backtrace: [<0000000038fe4895>] kstrdup+0x2d/0x60 [<00000000c99c049a>] event_hist_trigger_parse+0x206f/0x20e0 [<00000000ae70d2cc>] trigger_process_regex+0xc0/0x110 [<0000000066737a4c>] event_trigger_write+0x75/0xd0 [<000000007341e40c>] vfs_write+0xbb/0x2a0 [<0000000087fde4c2>] ksys_write+0x59/0xd0 [<00000000581e9cdf>] do_syscall_64+0x3a/0x80 [<00000000cf3b065c>] entry_SYSCALL_64_after_hwframe+0x46/0xb0
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc6:*:*:*:*:*:*

History

11 Mar 2025, 22:35

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux
Linux linux Kernel
CWE CWE-401
References () https://git.kernel.org/stable/c/22eeff55679d9e7c0f768c79bfbd83e2f8142d89 - () https://git.kernel.org/stable/c/22eeff55679d9e7c0f768c79bfbd83e2f8142d89 - Patch
References () https://git.kernel.org/stable/c/4d453eb5e1eec89971aa5b3262857ee26cfdffd3 - () https://git.kernel.org/stable/c/4d453eb5e1eec89971aa5b3262857ee26cfdffd3 - Patch
References () https://git.kernel.org/stable/c/78a1400c42ee11197eb1f0f85ba51df9a4fdfff0 - () https://git.kernel.org/stable/c/78a1400c42ee11197eb1f0f85ba51df9a4fdfff0 - Patch
References () https://git.kernel.org/stable/c/7edc3945bdce9c39198a10d6129377a5c53559c2 - () https://git.kernel.org/stable/c/7edc3945bdce9c39198a10d6129377a5c53559c2 - Patch
References () https://git.kernel.org/stable/c/eb622d5580b9e2ff694f62da6410618bd73853cb - () https://git.kernel.org/stable/c/eb622d5580b9e2ff694f62da6410618bd73853cb - Patch
References () https://git.kernel.org/stable/c/ecc6dec12c33aa92c086cd702af9f544ddaf3c75 - () https://git.kernel.org/stable/c/ecc6dec12c33aa92c086cd702af9f544ddaf3c75 - Patch
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc6:*:*:*:*:*:*
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tracing/histograms: Fix memory leak problem Esto revierte el commit 46bbe5c671e06f070428b9be142cc4ee5cedebac. Como decía el commit 46bbe5c671e0 ("tracing: fix double free"), el problema de "doble liberación" informado por el analizador estático de clang es: &gt; En parse_var_defs(), si hay un problema al asignar var_defs.expr, se libera el var_defs.name anterior. &gt; Esta liberación se duplica mediante free_var_defs(), que libera el resto de la lista. Sin embargo, si hay un problema al asignar la N-ésima var_defs.expr: + en parse_var_defs(), el 'var_defs.name anterior' liberado es en realidad el N-ésimo var_defs.name; + entonces en free_var_defs(), los nombres del 0 al (N-1)-ésimo se liberan; ¡SI SUCEDIÓ UN PROBLEMA DE ASIGNACIÓN AQUÍ!!! -+ \ | 0th 1th (N-1)-th N-th V +-------------+-------------+-----+-------------+----------- var_defs: | name | expr | name | expr | ... | name | expr | name | /// +-------------+-------------+-----+-------------+----------- Estas dos liberaciones no actúan sobre el mismo nombre, por lo que antes no había un problema de "doble liberación". Por el contrario, después de esa confirmación, tenemos un problema de "pérdida de memoria" porque el "N-ésimo var_defs.name" anterior no se libera. Si habilita CONFIG_DEBUG_KMEMLEAK e inyecta un error en el lugar donde se asignó el N-ésimo var_defs.expr, entonces ejecute en el shell de esta manera: $ echo 'hist:key=call_site:val=$v1,$v2:v1=bytes_req,v2=bytes_alloc' &gt; \ /sys/kernel/debug/tracing/events/kmem/kmalloc/trigger Then kmemleak reports: unreferenced object 0xffff8fb100ef3518 (size 8): comm "bash", pid 196, jiffies 4295681690 (age 28.538s) hex dump (first 8 bytes): 76 31 00 00 b1 8f ff ff v1...... backtrace: [&lt;0000000038fe4895&gt;] kstrdup+0x2d/0x60 [&lt;00000000c99c049a&gt;] event_hist_trigger_parse+0x206f/0x20e0 [&lt;00000000ae70d2cc&gt;] trigger_process_regex+0xc0/0x110 [&lt;0000000066737a4c&gt;] event_trigger_write+0x75/0xd0 [&lt;000000007341e40c&gt;] vfs_write+0xbb/0x2a0 [&lt;0000000087fde4c2&gt;] ksys_write+0x59/0xd0 [&lt;00000000581e9cdf&gt;] do_syscall_64+0x3a/0x80 [&lt;00000000cf3b065c&gt;] entry_SYSCALL_64_after_hwframe+0x46/0xb0

26 Feb 2025, 07:01

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-26 07:01

Updated : 2025-03-11 22:35


NVD link : CVE-2022-49648

Mitre link : CVE-2022-49648

CVE.ORG link : CVE-2022-49648


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-401

Missing Release of Memory after Effective Lifetime