-

CVE-2022-50569

xfrm: Update ipcomp_scratches with NULL when freed

In the Linux kernel, the following vulnerability has been resolved:

xfrm: Update ipcomp_scratches with NULL when freed

Currently if ipcomp_alloc_scratches() fails to allocate memory
ipcomp_scratches holds obsolete address. So when we try to free the
percpu scratches using ipcomp_free_scratches() it tries to vfree non
existent vm area. Described below:

static void * __percpu *ipcomp_alloc_scratches(void)
{
        ...
        scratches = alloc_percpu(void *);
        if (!scratches)
                return NULL;
ipcomp_scratches does not know about this allocation failure.
Therefore holding the old obsolete address.
        ...
}

So when we free,

static void ipcomp_free_scratches(void)
{
        ...
        scratches = ipcomp_scratches;
Assigning obsolete address from ipcomp_scratches

        if (!scratches)
                return;

        for_each_possible_cpu(i)
               vfree(*per_cpu_ptr(scratches, i));
Trying to free non existent page, causing warning: trying to vfree
existent vm area.
        ...
}

Fix this breakage by updating ipcomp_scrtches with NULL when scratches
is freed
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Version < debca61df6bc2f65e020656c9c5b878d6b38d30f
Status affected
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Version < a39f456d62810c0efb43cead22f98d95b53e4b1a
Status affected
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Version < 1e8abde895b3ac6a368cbdb372e8800c49e73a28
Status affected
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Version < 18373ed500f7cd53e24d9b0bd0f1c09d78dba87e
Status affected
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Version < be81c44242b20fc3bdcc73480ef8aaee56f5d0b6
Status affected
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Version < 03155680191ef0f004b1d6a5714c5b8cd271ab61
Status affected
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Version < f3bdba4440d82e0da2b1bfc35d3836c8a8e00677
Status affected
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Version < 2c19945ce8095d065df550e7fe350cd5cc40c6e6
Status affected
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Version < 8a04d2fc700f717104bfb95b0f6694e448a4537f
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 2.6.12
Status affected
Version 0
Version < 2.6.12
Status unaffected
Version <= 4.9.*
Version 4.9.331
Status unaffected
Version <= 4.14.*
Version 4.14.296
Status unaffected
Version <= 4.19.*
Version 4.19.262
Status unaffected
Version <= 5.4.*
Version 5.4.220
Status unaffected
Version <= 5.10.*
Version 5.10.150
Status unaffected
Version <= 5.15.*
Version 5.15.75
Status unaffected
Version <= 5.19.*
Version 5.19.17
Status unaffected
Version <= 6.0.*
Version 6.0.3
Status unaffected
Version <= *
Version 6.1
Status unaffected
VulnDex Vulnerability Enrichment
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.06% 0.192
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
Es wurden noch keine Informationen zu CWE veröffentlicht.