CVE-2022-49334

In the Linux kernel, the following vulnerability has been resolved: mm/huge_memory: Fix xarray node memory leak If xas_split_alloc() fails to allocate the necessary nodes to complete the xarray entry split, it sets the xa_state to -ENOMEM, which xas_nomem() then interprets as "Please allocate more memory", not as "Please free any unnecessary memory" (which was the intended outcome). It's confusing to use xas_nomem() to free memory in this context, so call xas_destroy() instead.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

13 Mar 2025, 21:52

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux linux Kernel
Linux
CWE CWE-401
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/69a37a8ba1b408a1c7616494aa7018e4b3844cbe - () https://git.kernel.org/stable/c/69a37a8ba1b408a1c7616494aa7018e4b3844cbe - Patch
References () https://git.kernel.org/stable/c/95c8181b4947e000f3b9b8e5918d899fce77b93d - () https://git.kernel.org/stable/c/95c8181b4947e000f3b9b8e5918d899fce77b93d - Patch
References () https://git.kernel.org/stable/c/c0c84962e297927ba57fd6ddc2bb000c9d149655 - () https://git.kernel.org/stable/c/c0c84962e297927ba57fd6ddc2bb000c9d149655 - Patch

26 Feb 2025, 07:01

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-26 07:01

Updated : 2025-03-13 21:52


NVD link : CVE-2022-49334

Mitre link : CVE-2022-49334


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-401

Missing Release of Memory after Effective Lifetime