Skip to main content

CVE-2022-49801: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2022-49801cvecve-2022-49801
Published: Thu May 01 2025 (05/01/2025, 14:09:29 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: tracing: Fix memory leak in tracing_read_pipe() kmemleak reports this issue: unreferenced object 0xffff888105a18900 (size 128): comm "test_progs", pid 18933, jiffies 4336275356 (age 22801.766s) hex dump (first 32 bytes): 25 73 00 90 81 88 ff ff 26 05 00 00 42 01 58 04 %s......&...B.X. 03 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000560143a1>] __kmalloc_node_track_caller+0x4a/0x140 [<000000006af00822>] krealloc+0x8d/0xf0 [<00000000c309be6a>] trace_iter_expand_format+0x99/0x150 [<000000005a53bdb6>] trace_check_vprintf+0x1e0/0x11d0 [<0000000065629d9d>] trace_event_printf+0xb6/0xf0 [<000000009a690dc7>] trace_raw_output_bpf_trace_printk+0x89/0xc0 [<00000000d22db172>] print_trace_line+0x73c/0x1480 [<00000000cdba76ba>] tracing_read_pipe+0x45c/0x9f0 [<0000000015b58459>] vfs_read+0x17b/0x7c0 [<000000004aeee8ed>] ksys_read+0xed/0x1c0 [<0000000063d3d898>] do_syscall_64+0x3b/0x90 [<00000000a06dda7f>] entry_SYSCALL_64_after_hwframe+0x63/0xcd iter->fmt alloced in tracing_read_pipe() -> .. ->trace_iter_expand_format(), but not freed, to fix, add free in tracing_release_pipe()

AI-Powered Analysis

AILast updated: 06/28/2025, 00:56:00 UTC

Technical Analysis

CVE-2022-49801 is a vulnerability identified in the Linux kernel related to a memory leak in the tracing subsystem, specifically within the function tracing_read_pipe(). The issue arises because memory allocated for the iterator format string (iter->fmt) during trace_iter_expand_format() is not properly freed, leading to a leak. The vulnerability was detected through kmemleak reports showing unreferenced kernel memory objects linked to the tracing functionality. The root cause is that while memory is allocated during tracing_read_pipe() and expanded in trace_iter_expand_format(), it is not released in tracing_release_pipe(), which should handle cleanup. This flaw can cause the kernel to consume increasing amounts of memory over time when tracing pipes are read, potentially leading to resource exhaustion. The vulnerability affects multiple Linux kernel versions identified by specific commit hashes. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. The vulnerability does not appear to allow direct code execution or privilege escalation but can degrade system stability and availability due to memory leaks in a core kernel component used for debugging and performance monitoring.

Potential Impact

For European organizations, the impact of CVE-2022-49801 primarily concerns system stability and availability. Linux is widely used across European enterprises, government agencies, and critical infrastructure, often as the backbone for servers, cloud environments, and embedded systems. A memory leak in the kernel tracing subsystem can lead to gradual memory exhaustion, causing system slowdowns, crashes, or forced reboots if tracing is heavily utilized. This can disrupt business operations, especially in environments relying on continuous monitoring and diagnostics. While the vulnerability does not directly compromise confidentiality or integrity, the resulting denial of service conditions could impact critical services. Organizations running Linux kernels with affected versions in production, particularly those using advanced tracing features for performance or security monitoring, are at risk. The lack of known exploits reduces immediate threat but does not eliminate the risk of future exploitation or accidental system failures.

Mitigation Recommendations

To mitigate CVE-2022-49801, European organizations should: 1) Apply the official Linux kernel patches that fix the memory leak by ensuring tracing_release_pipe() properly frees allocated memory. Since no patch links are provided, organizations should monitor the official Linux kernel repositories and distributions for updates addressing this issue. 2) Temporarily disable or limit the use of kernel tracing features, especially tracing pipes, in environments where continuous uptime is critical and patching is delayed. 3) Implement monitoring for unusual memory usage patterns in kernel space, focusing on tracing-related processes, to detect potential leaks early. 4) Conduct thorough testing of kernel updates in staging environments before deployment to avoid regressions. 5) Maintain up-to-date backups and recovery plans to mitigate potential service disruptions caused by kernel instability. 6) Engage with Linux distribution vendors to confirm the availability and deployment timeline of patches for affected kernel versions.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-05-01T14:05:17.225Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9821c4522896dcbdd736

Added to database: 5/21/2025, 9:08:49 AM

Last enriched: 6/28/2025, 12:56:00 AM

Last updated: 8/14/2025, 5:41:03 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats