vulnerability

Alma Linux: CVE-2022-49648: Moderate: kernel security update (ALSA-2025-20518)

Severity
5
CVSS
(AV:L/AC:L/Au:S/C:N/I:N/A:C)
Published
Nov 11, 2025
Added
Nov 20, 2025
Modified
Nov 20, 2025

Description

In the Linux kernel, the following vulnerability has been resolved:

tracing/histograms: Fix memory leak problem

This reverts commit 46bbe5c671e06f070428b9be142cc4ee5cedebac.

As commit 46bbe5c671e0 ("tracing: fix double free") said, the
"double free" problem reported by clang static analyzer is:
> In parse_var_defs() if there is a problem allocating
> var_defs.expr, the earlier var_defs.name is freed.
> This free is duplicated by free_var_defs() which frees
> the rest of the list.

However, if there is a problem allocating N-th var_defs.expr:
+ in parse_var_defs(), the freed 'earlier var_defs.name' is
actually the N-th var_defs.name;
+ then in free_var_defs(), the names from 0th to (N-1)-th are freed;

IF ALLOCATING PROBLEM HAPPENED HERE!!! -+
\
|
0th 1th (N-1)-th N-th V
+-------------+-------------+-----+-------------+-----------
var_defs: | name | expr | name | expr | ... | name | expr | name | ///
+-------------+-------------+-----+-------------+-----------

These two frees don't act on same name, so there was no "double free"
problem before. Conversely, after that commit, we get a "memory leak"
problem because the above "N-th var_defs.name" is not freed.

If enable CONFIG_DEBUG_KMEMLEAK and inject a fault at where the N-th
var_defs.expr allocated, then execute on shell like:
$ echo 'hist:key=call_site:val=$v1,$v2:v1=bytes_req,v2=bytes_alloc' > \
/sys/kernel/debug/tracing/events/kmem/kmalloc/trigger

Then kmemleak reports:
unreferenced object 0xffff8fb100ef3518 (size 8):
comm "bash", pid 196, jiffies 4295681690 (age 28.538s)
hex dump (first 8 bytes):
76 31 00 00 b1 8f ff ff v1......
backtrace:
[<0000000038fe4895>] kstrdup+0x2d/0x60
[<00000000c99c049a>] event_hist_trigger_parse+0x206f/0x20e0
[<00000000ae70d2cc>] trigger_process_regex+0xc0/0x110
[<0000000066737a4c>] event_trigger_write+0x75/0xd0
[<000000007341e40c>] vfs_write+0xbb/0x2a0
[<0000000087fde4c2>] ksys_write+0x59/0xd0
[<00000000581e9cdf>] do_syscall_64+0x3a/0x80
[<00000000cf3b065c>] entry_SYSCALL_64_after_hwframe+0x46/0xb0

Solutions

alma-upgrade-kernelalma-upgrade-kernel-64kalma-upgrade-kernel-64k-corealma-upgrade-kernel-64k-debugalma-upgrade-kernel-64k-debug-corealma-upgrade-kernel-64k-debug-develalma-upgrade-kernel-64k-debug-devel-matchedalma-upgrade-kernel-64k-debug-modulesalma-upgrade-kernel-64k-debug-modules-corealma-upgrade-kernel-64k-debug-modules-extraalma-upgrade-kernel-64k-develalma-upgrade-kernel-64k-devel-matchedalma-upgrade-kernel-64k-modulesalma-upgrade-kernel-64k-modules-corealma-upgrade-kernel-64k-modules-extraalma-upgrade-kernel-abi-stablelistsalma-upgrade-kernel-corealma-upgrade-kernel-cross-headersalma-upgrade-kernel-debugalma-upgrade-kernel-debug-corealma-upgrade-kernel-debug-develalma-upgrade-kernel-debug-devel-matchedalma-upgrade-kernel-debug-modulesalma-upgrade-kernel-debug-modules-corealma-upgrade-kernel-debug-modules-extraalma-upgrade-kernel-debug-uki-virtalma-upgrade-kernel-develalma-upgrade-kernel-devel-matchedalma-upgrade-kernel-docalma-upgrade-kernel-headersalma-upgrade-kernel-modulesalma-upgrade-kernel-modules-corealma-upgrade-kernel-modules-extraalma-upgrade-kernel-rtalma-upgrade-kernel-rt-64kalma-upgrade-kernel-rt-64k-corealma-upgrade-kernel-rt-64k-debugalma-upgrade-kernel-rt-64k-debug-corealma-upgrade-kernel-rt-64k-debug-develalma-upgrade-kernel-rt-64k-debug-modulesalma-upgrade-kernel-rt-64k-debug-modules-corealma-upgrade-kernel-rt-64k-debug-modules-extraalma-upgrade-kernel-rt-64k-develalma-upgrade-kernel-rt-64k-modulesalma-upgrade-kernel-rt-64k-modules-corealma-upgrade-kernel-rt-64k-modules-extraalma-upgrade-kernel-rt-corealma-upgrade-kernel-rt-debugalma-upgrade-kernel-rt-debug-corealma-upgrade-kernel-rt-debug-develalma-upgrade-kernel-rt-debug-modulesalma-upgrade-kernel-rt-debug-modules-corealma-upgrade-kernel-rt-debug-modules-extraalma-upgrade-kernel-rt-develalma-upgrade-kernel-rt-modulesalma-upgrade-kernel-rt-modules-corealma-upgrade-kernel-rt-modules-extraalma-upgrade-kernel-toolsalma-upgrade-kernel-tools-libsalma-upgrade-kernel-tools-libs-develalma-upgrade-kernel-uki-virtalma-upgrade-kernel-uki-virt-addonsalma-upgrade-kernel-zfcpdumpalma-upgrade-kernel-zfcpdump-corealma-upgrade-kernel-zfcpdump-develalma-upgrade-kernel-zfcpdump-devel-matchedalma-upgrade-kernel-zfcpdump-modulesalma-upgrade-kernel-zfcpdump-modules-corealma-upgrade-kernel-zfcpdump-modules-extraalma-upgrade-libperfalma-upgrade-perfalma-upgrade-python3-perfalma-upgrade-rtlaalma-upgrade-rv
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.