[<prev] [next>] [day] [month] [year] [list]
Message-ID: <87195904-6285-49d2-b311-b3c52526e682@suse.com>
Date: Sat, 4 Oct 2025 19:30:35 +0200
From: Juergen Gross <jgross@...e.com>
To: cve@...nel.org, linux-kernel@...r.kernel.org
Subject: Re: CVE-2022-50495: x86/xen: Fix memory leak in
xen_smp_intr_init{_pv}()
On 04.10.25 17:51, Greg Kroah-Hartman wrote:
> From: Greg Kroah-Hartman <gregkh@...nel.org>
>
> Description
> ===========
>
> In the Linux kernel, the following vulnerability has been resolved:
>
> x86/xen: Fix memory leak in xen_smp_intr_init{_pv}()
>
> These local variables @{resched|pmu|callfunc...}_name saves the new
> string allocated by kasprintf(), and when bind_{v}ipi_to_irqhandler()
> fails, it goes to the @fail tag, and calls xen_smp_intr_free{_pv}() to
> free resource, however the new string is not saved, which cause a memory
> leak issue. fix it.
>
> The Linux kernel CVE team has assigned CVE-2022-50495 to this issue.
Please revoke the CVE. This issue can't be triggered by an unprivileged user.
Juergen
Download attachment "OpenPGP_0xB0DE9DD628BF132F.asc" of type "application/pgp-keys" (3684 bytes)
Download attachment "OpenPGP_signature.asc" of type "application/pgp-signature" (496 bytes)
Powered by blists - more mailing lists