Skip to main content

CVE-2022-49784: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2022-49784cvecve-2022-49784
Published: Thu May 01 2025 (05/01/2025, 14:09:17 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: perf/x86/amd/uncore: Fix memory leak for events array When a CPU comes online, the per-CPU NB and LLC uncore contexts are freed but not the events array within the context structure. This causes a memory leak as identified by the kmemleak detector. [...] unreferenced object 0xffff8c5944b8e320 (size 32): comm "swapper/0", pid 1, jiffies 4294670387 (age 151.072s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<000000000759fb79>] amd_uncore_cpu_up_prepare+0xaf/0x230 [<00000000ddc9e126>] cpuhp_invoke_callback+0x2cf/0x470 [<0000000093e727d4>] cpuhp_issue_call+0x14d/0x170 [<0000000045464d54>] __cpuhp_setup_state_cpuslocked+0x11e/0x330 [<0000000069f67cbd>] __cpuhp_setup_state+0x6b/0x110 [<0000000015365e0f>] amd_uncore_init+0x260/0x321 [<00000000089152d2>] do_one_initcall+0x3f/0x1f0 [<000000002d0bd18d>] kernel_init_freeable+0x1ca/0x212 [<0000000030be8dde>] kernel_init+0x11/0x120 [<0000000059709e59>] ret_from_fork+0x22/0x30 unreferenced object 0xffff8c5944b8dd40 (size 64): comm "swapper/0", pid 1, jiffies 4294670387 (age 151.072s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000306efe8b>] amd_uncore_cpu_up_prepare+0x183/0x230 [<00000000ddc9e126>] cpuhp_invoke_callback+0x2cf/0x470 [<0000000093e727d4>] cpuhp_issue_call+0x14d/0x170 [<0000000045464d54>] __cpuhp_setup_state_cpuslocked+0x11e/0x330 [<0000000069f67cbd>] __cpuhp_setup_state+0x6b/0x110 [<0000000015365e0f>] amd_uncore_init+0x260/0x321 [<00000000089152d2>] do_one_initcall+0x3f/0x1f0 [<000000002d0bd18d>] kernel_init_freeable+0x1ca/0x212 [<0000000030be8dde>] kernel_init+0x11/0x120 [<0000000059709e59>] ret_from_fork+0x22/0x30 [...] Fix the problem by freeing the events array before freeing the uncore context.

AI-Powered Analysis

AILast updated: 06/30/2025, 01:39:32 UTC

Technical Analysis

CVE-2022-49784 is a vulnerability identified in the Linux kernel specifically within the perf subsystem for x86 AMD processors, related to the uncore performance monitoring context management. The flaw arises when a CPU comes online and the kernel frees the per-CPU Northbridge (NB) and Last Level Cache (LLC) uncore contexts but neglects to free the associated events array within the context structure. This omission results in a memory leak, as detected by the kernel memory leak detector (kmemleak). The vulnerability is rooted in the amd_uncore_cpu_up_prepare function, which is responsible for preparing uncore performance monitoring contexts when CPUs are brought online. The events array, which tracks performance events, remains allocated and unreferenced, causing continuous memory consumption over time. Although this issue does not directly lead to privilege escalation, code execution, or data corruption, the memory leak can degrade system performance and stability, especially on systems with frequent CPU hotplug events or long uptimes. The fix involves explicitly freeing the events array before releasing the uncore context, ensuring proper resource cleanup. This vulnerability affects Linux kernel versions identified by the provided commit hashes and is relevant for systems running AMD x86 processors with perf monitoring enabled. No known exploits are currently reported in the wild, and no CVSS score has been assigned to this vulnerability.

Potential Impact

For European organizations, the impact of CVE-2022-49784 is primarily related to system reliability and resource management rather than direct security compromise. Organizations running Linux servers, particularly those utilizing AMD x86 processors in data centers, cloud environments, or critical infrastructure, may experience gradual memory consumption leading to degraded performance or potential system instability over time. This can affect high-availability services, virtualized environments, and performance monitoring operations. While the vulnerability does not enable attackers to gain unauthorized access or execute arbitrary code, the memory leak could indirectly increase operational costs due to more frequent system reboots or maintenance. In environments with dynamic CPU hotplugging (e.g., cloud platforms scaling CPU resources), the leak could accumulate faster, exacerbating the impact. Therefore, European enterprises relying on Linux-based infrastructure should consider this vulnerability in their risk assessments to maintain system health and service continuity.

Mitigation Recommendations

To mitigate CVE-2022-49784, European organizations should: 1) Apply the official Linux kernel patches that fix the memory leak by ensuring the events array is freed properly during CPU online events. This requires updating to a kernel version that includes the fix or backporting the patch if using long-term support kernels. 2) Monitor system memory usage and kernel logs for signs of memory leaks related to perf subsystem activity, especially on systems with frequent CPU hotplug events. 3) Limit or control CPU hotplug operations where feasible to reduce the frequency of triggering the vulnerable code path. 4) Employ kernel memory leak detection tools such as kmemleak in testing and staging environments to proactively identify similar issues. 5) Coordinate with hardware vendors and Linux distribution maintainers to ensure timely deployment of patched kernels. 6) For critical systems, consider implementing automated kernel update mechanisms to reduce the window of exposure. These steps go beyond generic advice by focusing on operational practices tailored to the nature of this memory leak vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-05-01T14:05:17.223Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982cc4522896dcbe4ba6

Added to database: 5/21/2025, 9:09:00 AM

Last enriched: 6/30/2025, 1:39:32 AM

Last updated: 7/30/2025, 10:35:26 PM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats