-
CVE-2022-50569
- EPSS 0.06%
- Veröffentlicht 22.10.2025 13:23:25
- Zuletzt bearbeitet 15.04.2026 00:35:42
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
xfrm: Update ipcomp_scratches with NULL when freed
In the Linux kernel, the following vulnerability has been resolved:
xfrm: Update ipcomp_scratches with NULL when freed
Currently if ipcomp_alloc_scratches() fails to allocate memory
ipcomp_scratches holds obsolete address. So when we try to free the
percpu scratches using ipcomp_free_scratches() it tries to vfree non
existent vm area. Described below:
static void * __percpu *ipcomp_alloc_scratches(void)
{
...
scratches = alloc_percpu(void *);
if (!scratches)
return NULL;
ipcomp_scratches does not know about this allocation failure.
Therefore holding the old obsolete address.
...
}
So when we free,
static void ipcomp_free_scratches(void)
{
...
scratches = ipcomp_scratches;
Assigning obsolete address from ipcomp_scratches
if (!scratches)
return;
for_each_possible_cpu(i)
vfree(*per_cpu_ptr(scratches, i));
Trying to free non existent page, causing warning: trying to vfree
existent vm area.
...
}
Fix this breakage by updating ipcomp_scrtches with NULL when scratches
is freedDaten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Version <
debca61df6bc2f65e020656c9c5b878d6b38d30f
Status
affected
Version
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Version <
a39f456d62810c0efb43cead22f98d95b53e4b1a
Status
affected
Version
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Version <
1e8abde895b3ac6a368cbdb372e8800c49e73a28
Status
affected
Version
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Version <
18373ed500f7cd53e24d9b0bd0f1c09d78dba87e
Status
affected
Version
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Version <
be81c44242b20fc3bdcc73480ef8aaee56f5d0b6
Status
affected
Version
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Version <
03155680191ef0f004b1d6a5714c5b8cd271ab61
Status
affected
Version
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Version <
f3bdba4440d82e0da2b1bfc35d3836c8a8e00677
Status
affected
Version
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Version <
2c19945ce8095d065df550e7fe350cd5cc40c6e6
Status
affected
Version
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Version <
8a04d2fc700f717104bfb95b0f6694e448a4537f
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
2.6.12
Status
affected
Version
0
Version <
2.6.12
Status
unaffected
Version <=
4.9.*
Version
4.9.331
Status
unaffected
Version <=
4.14.*
Version
4.14.296
Status
unaffected
Version <=
4.19.*
Version
4.19.262
Status
unaffected
Version <=
5.4.*
Version
5.4.220
Status
unaffected
Version <=
5.10.*
Version
5.10.150
Status
unaffected
Version <=
5.15.*
Version
5.15.75
Status
unaffected
Version <=
5.19.*
Version
5.19.17
Status
unaffected
Version <=
6.0.*
Version
6.0.3
Status
unaffected
Version <=
*
Version
6.1
Status
unaffected
VulnDex Vulnerability Enrichment
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.06% | 0.192 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|