vulnerability

Debian: CVE-2022-49800: linux -- security update

Severity
5
CVSS
(AV:L/AC:L/Au:S/C:N/I:N/A:C)
Published
May 1, 2025
Added
May 5, 2025
Modified
May 6, 2025

Description

In the Linux kernel, the following vulnerability has been resolved:

tracing: Fix memory leak in test_gen_synth_cmd() and test_empty_synth_event()

test_gen_synth_cmd() only free buf in fail path, hence buf will leak
when there is no failure. Add kfree(buf) to prevent the memleak. The
same reason and solution in test_empty_synth_event().

unreferenced object 0xffff8881127de000 (size 2048):
comm "modprobe", pid 247, jiffies 4294972316 (age 78.756s)
hex dump (first 32 bytes):
20 67 65 6e 5f 73 79 6e 74 68 5f 74 65 73 74 20 gen_synth_test
20 70 69 64 5f 74 20 6e 65 78 74 5f 70 69 64 5f pid_t next_pid_
backtrace:
[] kmalloc_trace+0x26/0x100
[] 0xffffffffa00083cd
[] 0xffffffffa00086ba
[] do_one_initcall+0xdb/0x480
[] do_init_module+0x1cf/0x680
[] load_module+0x6a50/0x70a0
[] __do_sys_finit_module+0x12f/0x1c0
[] do_syscall_64+0x3f/0x90
[] entry_SYSCALL_64_after_hwframe+0x63/0xcd
unreferenced object 0xffff8881127df000 (size 2048):
comm "modprobe", pid 247, jiffies 4294972324 (age 78.728s)
hex dump (first 32 bytes):
20 65 6d 70 74 79 5f 73 79 6e 74 68 5f 74 65 73 empty_synth_tes
74 20 20 70 69 64 5f 74 20 6e 65 78 74 5f 70 69 t pid_t next_pi
backtrace:
[
] kmalloc_trace+0x26/0x100
[] 0xffffffffa0008071
[] 0xffffffffa00086ce
[] do_one_initcall+0xdb/0x480
[] do_init_module+0x1cf/0x680
[] load_module+0x6a50/0x70a0
[] __do_sys_finit_module+0x12f/0x1c0
[] do_syscall_64+0x3f/0x90
[] entry_SYSCALL_64_after_hwframe+0x63/0xcd

Solution

debian-upgrade-linux
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.