Логотип exploitDog
bind: "CVE-2022-49080"
Консоль
Логотип exploitDog

exploitDog

bind: "CVE-2022-49080"

Количество 29

Количество 29

ubuntu логотип

CVE-2022-49080

6 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: mm/mempolicy: fix mpol_new leak in shared_policy_replace If mpol_new is allocated but not used in restart loop, mpol_new will be freed via mpol_put before returning to the caller. But refcnt is not initialized yet, so mpol_put could not do the right things and might leak the unused mpol_new. This would happen if mempolicy was updated on the shared shmem file while the sp->lock has been dropped during the memory allocation. This issue could be triggered easily with the below code snippet if there are many processes doing the below work at the same time: shmid = shmget((key_t)5566, 1024 * PAGE_SIZE, 0666|IPC_CREAT); shm = shmat(shmid, 0, 0); loop many times { mbind(shm, 1024 * PAGE_SIZE, MPOL_LOCAL, mask, maxnode, 0); mbind(shm + 128 * PAGE_SIZE, 128 * PAGE_SIZE, MPOL_DEFAULT, mask, maxnode, 0); }

EPSS: Низкий
redhat логотип

CVE-2022-49080

7 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: mm/mempolicy: fix mpol_new leak in shared_policy_replace If mpol_new is allocated but not used in restart loop, mpol_new will be freed via mpol_put before returning to the caller. But refcnt is not initialized yet, so mpol_put could not do the right things and might leak the unused mpol_new. This would happen if mempolicy was updated on the shared shmem file while the sp->lock has been dropped during the memory allocation. This issue could be triggered easily with the below code snippet if there are many processes doing the below work at the same time: shmid = shmget((key_t)5566, 1024 * PAGE_SIZE, 0666|IPC_CREAT); shm = shmat(shmid, 0, 0); loop many times { mbind(shm, 1024 * PAGE_SIZE, MPOL_LOCAL, mask, maxnode, 0); mbind(shm + 128 * PAGE_SIZE, 128 * PAGE_SIZE, MPOL_DEFAULT, mask, maxnode, 0); }

CVSS3: 5.5
EPSS: Низкий
nvd логотип

CVE-2022-49080

6 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: mm/mempolicy: fix mpol_new leak in shared_policy_replace If mpol_new is allocated but not used in restart loop, mpol_new will be freed via mpol_put before returning to the caller. But refcnt is not initialized yet, so mpol_put could not do the right things and might leak the unused mpol_new. This would happen if mempolicy was updated on the shared shmem file while the sp->lock has been dropped during the memory allocation. This issue could be triggered easily with the below code snippet if there are many processes doing the below work at the same time: shmid = shmget((key_t)5566, 1024 * PAGE_SIZE, 0666|IPC_CREAT); shm = shmat(shmid, 0, 0); loop many times { mbind(shm, 1024 * PAGE_SIZE, MPOL_LOCAL, mask, maxnode, 0); mbind(shm + 128 * PAGE_SIZE, 128 * PAGE_SIZE, MPOL_DEFAULT, mask, maxnode, 0); }

EPSS: Низкий
debian логотип

CVE-2022-49080

6 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: m ...

EPSS: Низкий
fstec логотип

BDU:2025-06063

больше 3 лет назад

Уязвимость функции kmem_cache_alloc() модуля mm/mempolicy.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:01950-1

3 месяца назад

Security update for the Linux Kernel (Live Patch 29 for SLE 15 SP4)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:01935-1

3 месяца назад

Security update for the Linux Kernel (Live Patch 27 for SLE 15 SP4)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:01928-1

3 месяца назад

Security update for the Linux Kernel (Live Patch 32 for SLE 15 SP4)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:01927-1

3 месяца назад

Security update for the Linux Kernel (Live Patch 36 for SLE 15 SP4)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:01922-1

3 месяца назад

Security update for the Linux Kernel (Live Patch 34 for SLE 15 SP4)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:01906-1

3 месяца назад

Security update for the Linux Kernel (Live Patch 28 for SLE 15 SP4)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:01901-1

3 месяца назад

Security update for the Linux Kernel (Live Patch 52 for SLE 15 SP3)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:01899-1

3 месяца назад

Security update for the Linux Kernel (Live Patch 56 for SLE 12 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:01892-1

3 месяца назад

Security update for the Linux Kernel (Live Patch 51 for SLE 15 SP3)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:01868-1

3 месяца назад

Security update for the Linux Kernel (Live Patch 49 for SLE 15 SP3)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:01849-1

3 месяца назад

Security update for the Linux Kernel (Live Patch 60 for SLE 12 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:01844-1

3 месяца назад

Security update for the Linux Kernel (Live Patch 57 for SLE 12 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:01893-1

3 месяца назад

Security update for the Linux Kernel (Live Patch 23 for SLE 15 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:01875-1

3 месяца назад

Security update for the Linux Kernel (Live Patch 22 for SLE 15 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:01956-1

3 месяца назад

Security update for the Linux Kernel (Live Patch 54 for SLE 15 SP3)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2022-49080

In the Linux kernel, the following vulnerability has been resolved: mm/mempolicy: fix mpol_new leak in shared_policy_replace If mpol_new is allocated but not used in restart loop, mpol_new will be freed via mpol_put before returning to the caller. But refcnt is not initialized yet, so mpol_put could not do the right things and might leak the unused mpol_new. This would happen if mempolicy was updated on the shared shmem file while the sp->lock has been dropped during the memory allocation. This issue could be triggered easily with the below code snippet if there are many processes doing the below work at the same time: shmid = shmget((key_t)5566, 1024 * PAGE_SIZE, 0666|IPC_CREAT); shm = shmat(shmid, 0, 0); loop many times { mbind(shm, 1024 * PAGE_SIZE, MPOL_LOCAL, mask, maxnode, 0); mbind(shm + 128 * PAGE_SIZE, 128 * PAGE_SIZE, MPOL_DEFAULT, mask, maxnode, 0); }

0%
Низкий
6 месяцев назад
redhat логотип
CVE-2022-49080

In the Linux kernel, the following vulnerability has been resolved: mm/mempolicy: fix mpol_new leak in shared_policy_replace If mpol_new is allocated but not used in restart loop, mpol_new will be freed via mpol_put before returning to the caller. But refcnt is not initialized yet, so mpol_put could not do the right things and might leak the unused mpol_new. This would happen if mempolicy was updated on the shared shmem file while the sp->lock has been dropped during the memory allocation. This issue could be triggered easily with the below code snippet if there are many processes doing the below work at the same time: shmid = shmget((key_t)5566, 1024 * PAGE_SIZE, 0666|IPC_CREAT); shm = shmat(shmid, 0, 0); loop many times { mbind(shm, 1024 * PAGE_SIZE, MPOL_LOCAL, mask, maxnode, 0); mbind(shm + 128 * PAGE_SIZE, 128 * PAGE_SIZE, MPOL_DEFAULT, mask, maxnode, 0); }

CVSS3: 5.5
0%
Низкий
7 месяцев назад
nvd логотип
CVE-2022-49080

In the Linux kernel, the following vulnerability has been resolved: mm/mempolicy: fix mpol_new leak in shared_policy_replace If mpol_new is allocated but not used in restart loop, mpol_new will be freed via mpol_put before returning to the caller. But refcnt is not initialized yet, so mpol_put could not do the right things and might leak the unused mpol_new. This would happen if mempolicy was updated on the shared shmem file while the sp->lock has been dropped during the memory allocation. This issue could be triggered easily with the below code snippet if there are many processes doing the below work at the same time: shmid = shmget((key_t)5566, 1024 * PAGE_SIZE, 0666|IPC_CREAT); shm = shmat(shmid, 0, 0); loop many times { mbind(shm, 1024 * PAGE_SIZE, MPOL_LOCAL, mask, maxnode, 0); mbind(shm + 128 * PAGE_SIZE, 128 * PAGE_SIZE, MPOL_DEFAULT, mask, maxnode, 0); }

0%
Низкий
6 месяцев назад
debian логотип
CVE-2022-49080

In the Linux kernel, the following vulnerability has been resolved: m ...

0%
Низкий
6 месяцев назад
fstec логотип
BDU:2025-06063

Уязвимость функции kmem_cache_alloc() модуля mm/mempolicy.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.5
0%
Низкий
больше 3 лет назад
suse-cvrf логотип
SUSE-SU-2025:01950-1

Security update for the Linux Kernel (Live Patch 29 for SLE 15 SP4)

3 месяца назад
suse-cvrf логотип
SUSE-SU-2025:01935-1

Security update for the Linux Kernel (Live Patch 27 for SLE 15 SP4)

3 месяца назад
suse-cvrf логотип
SUSE-SU-2025:01928-1

Security update for the Linux Kernel (Live Patch 32 for SLE 15 SP4)

3 месяца назад
suse-cvrf логотип
SUSE-SU-2025:01927-1

Security update for the Linux Kernel (Live Patch 36 for SLE 15 SP4)

3 месяца назад
suse-cvrf логотип
SUSE-SU-2025:01922-1

Security update for the Linux Kernel (Live Patch 34 for SLE 15 SP4)

3 месяца назад
suse-cvrf логотип
SUSE-SU-2025:01906-1

Security update for the Linux Kernel (Live Patch 28 for SLE 15 SP4)

3 месяца назад
suse-cvrf логотип
SUSE-SU-2025:01901-1

Security update for the Linux Kernel (Live Patch 52 for SLE 15 SP3)

3 месяца назад
suse-cvrf логотип
SUSE-SU-2025:01899-1

Security update for the Linux Kernel (Live Patch 56 for SLE 12 SP5)

3 месяца назад
suse-cvrf логотип
SUSE-SU-2025:01892-1

Security update for the Linux Kernel (Live Patch 51 for SLE 15 SP3)

3 месяца назад
suse-cvrf логотип
SUSE-SU-2025:01868-1

Security update for the Linux Kernel (Live Patch 49 for SLE 15 SP3)

3 месяца назад
suse-cvrf логотип
SUSE-SU-2025:01849-1

Security update for the Linux Kernel (Live Patch 60 for SLE 12 SP5)

3 месяца назад
suse-cvrf логотип
SUSE-SU-2025:01844-1

Security update for the Linux Kernel (Live Patch 57 for SLE 12 SP5)

3 месяца назад
suse-cvrf логотип
SUSE-SU-2025:01893-1

Security update for the Linux Kernel (Live Patch 23 for SLE 15 SP5)

3 месяца назад
suse-cvrf логотип
SUSE-SU-2025:01875-1

Security update for the Linux Kernel (Live Patch 22 for SLE 15 SP5)

3 месяца назад
suse-cvrf логотип
SUSE-SU-2025:01956-1

Security update for the Linux Kernel (Live Patch 54 for SLE 15 SP3)

3 месяца назад

Уязвимостей на страницу