CVE-2022-49784: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: perf/x86/amd/uncore: Fix memory leak for events array When a CPU comes online, the per-CPU NB and LLC uncore contexts are freed but not the events array within the context structure. This causes a memory leak as identified by the kmemleak detector. [...] unreferenced object 0xffff8c5944b8e320 (size 32): comm "swapper/0", pid 1, jiffies 4294670387 (age 151.072s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<000000000759fb79>] amd_uncore_cpu_up_prepare+0xaf/0x230 [<00000000ddc9e126>] cpuhp_invoke_callback+0x2cf/0x470 [<0000000093e727d4>] cpuhp_issue_call+0x14d/0x170 [<0000000045464d54>] __cpuhp_setup_state_cpuslocked+0x11e/0x330 [<0000000069f67cbd>] __cpuhp_setup_state+0x6b/0x110 [<0000000015365e0f>] amd_uncore_init+0x260/0x321 [<00000000089152d2>] do_one_initcall+0x3f/0x1f0 [<000000002d0bd18d>] kernel_init_freeable+0x1ca/0x212 [<0000000030be8dde>] kernel_init+0x11/0x120 [<0000000059709e59>] ret_from_fork+0x22/0x30 unreferenced object 0xffff8c5944b8dd40 (size 64): comm "swapper/0", pid 1, jiffies 4294670387 (age 151.072s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000306efe8b>] amd_uncore_cpu_up_prepare+0x183/0x230 [<00000000ddc9e126>] cpuhp_invoke_callback+0x2cf/0x470 [<0000000093e727d4>] cpuhp_issue_call+0x14d/0x170 [<0000000045464d54>] __cpuhp_setup_state_cpuslocked+0x11e/0x330 [<0000000069f67cbd>] __cpuhp_setup_state+0x6b/0x110 [<0000000015365e0f>] amd_uncore_init+0x260/0x321 [<00000000089152d2>] do_one_initcall+0x3f/0x1f0 [<000000002d0bd18d>] kernel_init_freeable+0x1ca/0x212 [<0000000030be8dde>] kernel_init+0x11/0x120 [<0000000059709e59>] ret_from_fork+0x22/0x30 [...] Fix the problem by freeing the events array before freeing the uncore context.
AI Analysis
Technical Summary
CVE-2022-49784 is a vulnerability identified in the Linux kernel specifically within the perf subsystem for x86 AMD processors, related to the uncore performance monitoring context management. The flaw arises when a CPU comes online and the kernel frees the per-CPU Northbridge (NB) and Last Level Cache (LLC) uncore contexts but neglects to free the associated events array within the context structure. This omission results in a memory leak, as detected by the kernel memory leak detector (kmemleak). The vulnerability is rooted in the amd_uncore_cpu_up_prepare function, which is responsible for preparing uncore performance monitoring contexts when CPUs are brought online. The events array, which tracks performance events, remains allocated and unreferenced, causing continuous memory consumption over time. Although this issue does not directly lead to privilege escalation, code execution, or data corruption, the memory leak can degrade system performance and stability, especially on systems with frequent CPU hotplug events or long uptimes. The fix involves explicitly freeing the events array before releasing the uncore context, ensuring proper resource cleanup. This vulnerability affects Linux kernel versions identified by the provided commit hashes and is relevant for systems running AMD x86 processors with perf monitoring enabled. No known exploits are currently reported in the wild, and no CVSS score has been assigned to this vulnerability.
Potential Impact
For European organizations, the impact of CVE-2022-49784 is primarily related to system reliability and resource management rather than direct security compromise. Organizations running Linux servers, particularly those utilizing AMD x86 processors in data centers, cloud environments, or critical infrastructure, may experience gradual memory consumption leading to degraded performance or potential system instability over time. This can affect high-availability services, virtualized environments, and performance monitoring operations. While the vulnerability does not enable attackers to gain unauthorized access or execute arbitrary code, the memory leak could indirectly increase operational costs due to more frequent system reboots or maintenance. In environments with dynamic CPU hotplugging (e.g., cloud platforms scaling CPU resources), the leak could accumulate faster, exacerbating the impact. Therefore, European enterprises relying on Linux-based infrastructure should consider this vulnerability in their risk assessments to maintain system health and service continuity.
Mitigation Recommendations
To mitigate CVE-2022-49784, European organizations should: 1) Apply the official Linux kernel patches that fix the memory leak by ensuring the events array is freed properly during CPU online events. This requires updating to a kernel version that includes the fix or backporting the patch if using long-term support kernels. 2) Monitor system memory usage and kernel logs for signs of memory leaks related to perf subsystem activity, especially on systems with frequent CPU hotplug events. 3) Limit or control CPU hotplug operations where feasible to reduce the frequency of triggering the vulnerable code path. 4) Employ kernel memory leak detection tools such as kmemleak in testing and staging environments to proactively identify similar issues. 5) Coordinate with hardware vendors and Linux distribution maintainers to ensure timely deployment of patched kernels. 6) For critical systems, consider implementing automated kernel update mechanisms to reduce the window of exposure. These steps go beyond generic advice by focusing on operational practices tailored to the nature of this memory leak vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2022-49784: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: perf/x86/amd/uncore: Fix memory leak for events array When a CPU comes online, the per-CPU NB and LLC uncore contexts are freed but not the events array within the context structure. This causes a memory leak as identified by the kmemleak detector. [...] unreferenced object 0xffff8c5944b8e320 (size 32): comm "swapper/0", pid 1, jiffies 4294670387 (age 151.072s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<000000000759fb79>] amd_uncore_cpu_up_prepare+0xaf/0x230 [<00000000ddc9e126>] cpuhp_invoke_callback+0x2cf/0x470 [<0000000093e727d4>] cpuhp_issue_call+0x14d/0x170 [<0000000045464d54>] __cpuhp_setup_state_cpuslocked+0x11e/0x330 [<0000000069f67cbd>] __cpuhp_setup_state+0x6b/0x110 [<0000000015365e0f>] amd_uncore_init+0x260/0x321 [<00000000089152d2>] do_one_initcall+0x3f/0x1f0 [<000000002d0bd18d>] kernel_init_freeable+0x1ca/0x212 [<0000000030be8dde>] kernel_init+0x11/0x120 [<0000000059709e59>] ret_from_fork+0x22/0x30 unreferenced object 0xffff8c5944b8dd40 (size 64): comm "swapper/0", pid 1, jiffies 4294670387 (age 151.072s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000306efe8b>] amd_uncore_cpu_up_prepare+0x183/0x230 [<00000000ddc9e126>] cpuhp_invoke_callback+0x2cf/0x470 [<0000000093e727d4>] cpuhp_issue_call+0x14d/0x170 [<0000000045464d54>] __cpuhp_setup_state_cpuslocked+0x11e/0x330 [<0000000069f67cbd>] __cpuhp_setup_state+0x6b/0x110 [<0000000015365e0f>] amd_uncore_init+0x260/0x321 [<00000000089152d2>] do_one_initcall+0x3f/0x1f0 [<000000002d0bd18d>] kernel_init_freeable+0x1ca/0x212 [<0000000030be8dde>] kernel_init+0x11/0x120 [<0000000059709e59>] ret_from_fork+0x22/0x30 [...] Fix the problem by freeing the events array before freeing the uncore context.
AI-Powered Analysis
Technical Analysis
CVE-2022-49784 is a vulnerability identified in the Linux kernel specifically within the perf subsystem for x86 AMD processors, related to the uncore performance monitoring context management. The flaw arises when a CPU comes online and the kernel frees the per-CPU Northbridge (NB) and Last Level Cache (LLC) uncore contexts but neglects to free the associated events array within the context structure. This omission results in a memory leak, as detected by the kernel memory leak detector (kmemleak). The vulnerability is rooted in the amd_uncore_cpu_up_prepare function, which is responsible for preparing uncore performance monitoring contexts when CPUs are brought online. The events array, which tracks performance events, remains allocated and unreferenced, causing continuous memory consumption over time. Although this issue does not directly lead to privilege escalation, code execution, or data corruption, the memory leak can degrade system performance and stability, especially on systems with frequent CPU hotplug events or long uptimes. The fix involves explicitly freeing the events array before releasing the uncore context, ensuring proper resource cleanup. This vulnerability affects Linux kernel versions identified by the provided commit hashes and is relevant for systems running AMD x86 processors with perf monitoring enabled. No known exploits are currently reported in the wild, and no CVSS score has been assigned to this vulnerability.
Potential Impact
For European organizations, the impact of CVE-2022-49784 is primarily related to system reliability and resource management rather than direct security compromise. Organizations running Linux servers, particularly those utilizing AMD x86 processors in data centers, cloud environments, or critical infrastructure, may experience gradual memory consumption leading to degraded performance or potential system instability over time. This can affect high-availability services, virtualized environments, and performance monitoring operations. While the vulnerability does not enable attackers to gain unauthorized access or execute arbitrary code, the memory leak could indirectly increase operational costs due to more frequent system reboots or maintenance. In environments with dynamic CPU hotplugging (e.g., cloud platforms scaling CPU resources), the leak could accumulate faster, exacerbating the impact. Therefore, European enterprises relying on Linux-based infrastructure should consider this vulnerability in their risk assessments to maintain system health and service continuity.
Mitigation Recommendations
To mitigate CVE-2022-49784, European organizations should: 1) Apply the official Linux kernel patches that fix the memory leak by ensuring the events array is freed properly during CPU online events. This requires updating to a kernel version that includes the fix or backporting the patch if using long-term support kernels. 2) Monitor system memory usage and kernel logs for signs of memory leaks related to perf subsystem activity, especially on systems with frequent CPU hotplug events. 3) Limit or control CPU hotplug operations where feasible to reduce the frequency of triggering the vulnerable code path. 4) Employ kernel memory leak detection tools such as kmemleak in testing and staging environments to proactively identify similar issues. 5) Coordinate with hardware vendors and Linux distribution maintainers to ensure timely deployment of patched kernels. 6) For critical systems, consider implementing automated kernel update mechanisms to reduce the window of exposure. These steps go beyond generic advice by focusing on operational practices tailored to the nature of this memory leak vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-05-01T14:05:17.223Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982cc4522896dcbe4ba6
Added to database: 5/21/2025, 9:09:00 AM
Last enriched: 6/30/2025, 1:39:32 AM
Last updated: 7/30/2025, 10:35:26 PM
Views: 17
Related Threats
CVE-2025-55203: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in makeplane plane
MediumCVE-2025-54989: CWE-476: NULL Pointer Dereference in FirebirdSQL firebird
MediumCVE-2025-24975: CWE-754: Improper Check for Unusual or Exceptional Conditions in FirebirdSQL firebird
HighCVE-2025-5048: CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in Autodesk AutoCAD
HighCVE-2025-5047: CWE-457: Use of Uninitialized Variable in Autodesk AutoCAD
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.