CVE-2022-49410

In the Linux kernel, the following vulnerability has been resolved: tracing: Fix potential double free in create_var_ref() In create_var_ref(), init_var_ref() is called to initialize the fields of variable ref_field, which is allocated in the previous function call to create_hist_field(). Function init_var_ref() allocates the corresponding fields such as ref_field->system, but frees these fields when the function encounters an error. The caller later calls destroy_hist_field() to conduct error handling, which frees the fields and the variable itself. This results in double free of the fields which are already freed in the previous function. Fix this by storing NULL to the corresponding fields when they are freed in init_var_ref().
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

17 Apr 2025, 20:31

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/c27f744ceefadc7bbeb14233b6abc150ced617d2 - () https://git.kernel.org/stable/c/c27f744ceefadc7bbeb14233b6abc150ced617d2 - Patch
References () https://git.kernel.org/stable/c/bd83ff3bbfb003832481c9bff999d12385f396ae - () https://git.kernel.org/stable/c/bd83ff3bbfb003832481c9bff999d12385f396ae - Patch
References () https://git.kernel.org/stable/c/4fdfb15e08598711dbf50daf56a33965232daf0e - () https://git.kernel.org/stable/c/4fdfb15e08598711dbf50daf56a33965232daf0e - Patch
References () https://git.kernel.org/stable/c/99696a2592bca641eb88cc9a80c90e591afebd0f - () https://git.kernel.org/stable/c/99696a2592bca641eb88cc9a80c90e591afebd0f - Patch
References () https://git.kernel.org/stable/c/37443b3508b8cce6832f8d25cb4550b2f7801f50 - () https://git.kernel.org/stable/c/37443b3508b8cce6832f8d25cb4550b2f7801f50 - Patch
References () https://git.kernel.org/stable/c/f8b383f83cb573152c577eca1ef101e89995b72a - () https://git.kernel.org/stable/c/f8b383f83cb573152c577eca1ef101e89995b72a - Patch
References () https://git.kernel.org/stable/c/058cb6d86b9789377216c936506b346aaa1eb581 - () https://git.kernel.org/stable/c/058cb6d86b9789377216c936506b346aaa1eb581 - Patch
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CWE CWE-415
First Time Linux linux Kernel
Linux

26 Feb 2025, 07:01

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-26 07:01

Updated : 2025-04-17 20:31


NVD link : CVE-2022-49410

Mitre link : CVE-2022-49410


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-415

Double Free