SB20250502101 - Memory leak in Linux kernel trace
Published: May 2, 2025 Updated: May 10, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Memory leak (CVE-ID: CVE-2022-49800)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the test_gen_synth_cmd() and test_empty_synth_event() functions in kernel/trace/synth_event_gen_test.c. A local user can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/07ba4f0603aba288580866394f2916dfe55823a2
- https://git.kernel.org/stable/c/0e5baaa181a052d968701bb9c5b1d55847f00942
- https://git.kernel.org/stable/c/65ba7e7c241122ef0a9e61d1920f2ae9689aa796
- https://git.kernel.org/stable/c/a4527fef9afe5c903c718d0cd24609fe9c754250
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.156
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.80
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.0.10
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1