CVE-2022-49853

Source
https://cve.org/CVERecord?id=CVE-2022-49853
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49853.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49853
Downstream
Related
Published
2025-05-01T14:10:07.726Z
Modified
2026-04-03T13:14:22.428628989Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
net: macvlan: fix memory leaks of macvlan_common_newlink
Details

In the Linux kernel, the following vulnerability has been resolved:

net: macvlan: fix memory leaks of macvlancommonnewlink

kmemleak reports memory leaks in macvlancommonnewlink, as follows:

ip link add link eth0 name .. type macvlan mode source macaddr add <MAC-ADDR>

kmemleak reports:

unreferenced object 0xffff8880109bb140 (size 64): comm "ip", pid 284, jiffies 4294986150 (age 430.108s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 b8 aa 5a 12 80 88 ff ff ..........Z..... 80 1b fa 0d 80 88 ff ff 1e ff ac af c7 c1 6b 6b ..............kk backtrace: [<ffffffff813e06a7>] kmemcachealloctrace+0x1c7/0x300 [<ffffffff81b66025>] macvlanhashaddsource+0x45/0xc0 [<ffffffff81b66a67>] macvlanchangelinksources+0xd7/0x170 [<ffffffff81b6775c>] macvlancommonnewlink+0x38c/0x5a0 [<ffffffff81b6797e>] macvlan_newlink+0xe/0x20 [<ffffffff81d97f8f>] __rtnlnewlink+0x7af/0xa50 [<ffffffff81d98278>] rtnlnewlink+0x48/0x70 ...

In the scenario where the macvlan mode is configured as 'source', macvlanchangelinksources() will be execured to reconfigure list of remote source mac addresses, at the same time, if registernetdevice() return an error, the resource generated by macvlanchangelink_sources() is not cleaned up.

Using this patch, in the case of an error, it will execute macvlanflushsources() to ensure that the resource is cleaned up.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49853.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
aa5fd0fb77486b8a6764ead8627baa14790e4280
Fixed
9f288e338be206713d79b29144c27fca4503c39b
Fixed
21d3a8b6a1e39e7529ce9de07316ee13a63f305b
Fixed
a81b44d1df1f07f00c0dcc0a0b3d2fa24a46289e
Fixed
685e73e3f7a9fb75cbf049a9d0b7c45cc6b57b2e
Fixed
956e0216a19994443c90ba2ea6b0b284c9c4f9cb
Fixed
a8d67367ab33604326cc37ab44fd1801bf5691ba
Fixed
9ea003c4671b2fc455320ecf6d4a43b0a3c1878a
Fixed
23569b5652ee8e8e55a12f7835f59af6f3cefc30

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49853.json"