vulnerability
Debian: CVE-2022-49800: linux -- security update
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
5 | (AV:L/AC:L/Au:S/C:N/I:N/A:C) | May 1, 2025 | May 5, 2025 | May 6, 2025 |
Description
In the Linux kernel, the following vulnerability has been resolved:
tracing: Fix memory leak in test_gen_synth_cmd() and test_empty_synth_event()
test_gen_synth_cmd() only free buf in fail path, hence buf will leak
when there is no failure. Add kfree(buf) to prevent the memleak. The
same reason and solution in test_empty_synth_event().
unreferenced object 0xffff8881127de000 (size 2048):
comm "modprobe", pid 247, jiffies 4294972316 (age 78.756s)
hex dump (first 32 bytes):
20 67 65 6e 5f 73 79 6e 74 68 5f 74 65 73 74 20 gen_synth_test
20 70 69 64 5f 74 20 6e 65 78 74 5f 70 69 64 5f pid_t next_pid_
backtrace:
[] kmalloc_trace+0x26/0x100
[] 0xffffffffa00083cd
[] 0xffffffffa00086ba
[] do_one_initcall+0xdb/0x480
[] do_init_module+0x1cf/0x680
[] load_module+0x6a50/0x70a0
[] __do_sys_finit_module+0x12f/0x1c0
[] do_syscall_64+0x3f/0x90
[] entry_SYSCALL_64_after_hwframe+0x63/0xcd
unreferenced object 0xffff8881127df000 (size 2048):
comm "modprobe", pid 247, jiffies 4294972324 (age 78.728s)
hex dump (first 32 bytes):
20 65 6d 70 74 79 5f 73 79 6e 74 68 5f 74 65 73 empty_synth_tes
74 20 20 70 69 64 5f 74 20 6e 65 78 74 5f 70 69 t pid_t next_pi
backtrace:
[] kmalloc_trace+0x26/0x100
[] 0xffffffffa0008071
[] 0xffffffffa00086ce
[] do_one_initcall+0xdb/0x480
[] do_init_module+0x1cf/0x680
[] load_module+0x6a50/0x70a0
[] __do_sys_finit_module+0x12f/0x1c0
[] do_syscall_64+0x3f/0x90
[] entry_SYSCALL_64_after_hwframe+0x63/0xcd
Solution

Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.