CVE-2022-50765

Source
https://cve.org/CVERecord?id=CVE-2022-50765
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50765.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-50765
Downstream
Published
2025-12-24T13:05:56.123Z
Modified
2026-03-10T21:52:23.203941Z
Summary
RISC-V: kexec: Fix memory leak of elf header buffer
Details

In the Linux kernel, the following vulnerability has been resolved:

RISC-V: kexec: Fix memory leak of elf header buffer

This is reported by kmemleak detector:

unreferenced object 0xff2000000403d000 (size 4096): comm "kexec", pid 146, jiffies 4294900633 (age 64.792s) hex dump (first 32 bytes): 7f 45 4c 46 02 01 01 00 00 00 00 00 00 00 00 00 .ELF............ 04 00 f3 00 01 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000566ca97c>] kmemleak_vmalloc+0x3c/0xbe [<00000000979283d8>] __vmallocnoderange+0x3ac/0x560 [<00000000b4b3712a>] __vmallocnode+0x56/0x62 [<00000000854f75e2>] vzalloc+0x2c/0x34 [<00000000e9a00db9>] crashprepareelf64headers+0x80/0x30c [<0000000067e8bf48>] elfkexecload+0x3e8/0x4ec [<0000000036548e09>] kexecimageloaddefault+0x40/0x4c [<0000000079fbe1b4>] syskexecfileload+0x1c4/0x322 [<0000000040c62c03>] retfromsyscall+0x0/0x2

In elfkexecload(), a buffer is allocated via vzalloc() to store elf headers. While it's not freed back to system when kdump kernel is reloaded or unloaded, or when image->elfheader is successfully set and then fails to load kdump kernel for some reason. Fix it by freeing the buffer in archkimagefilepostloadcleanup().

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50765.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
8acea455fafaf2620b247de6c00774828b618a82
Fixed
090bfcfc9f14d05154893c67eeaecc56e894fbae
Fixed
cdea2da6787583ecca43594132533a2ac8d7cd21
Fixed
cbc32023ddbdf4baa3d9dc513a2184a84080a5a2

Affected versions

v5.*
v5.18
v5.18-rc2
v5.18-rc3
v5.18-rc4
v5.18-rc5
v5.18-rc6
v5.18-rc7
v5.19
v5.19-rc1
v5.19-rc2
v5.19-rc3
v5.19-rc4
v5.19-rc5
v5.19-rc6
v5.19-rc7
v5.19-rc8
v6.*
v6.0
v6.0-rc1
v6.0-rc2
v6.0-rc3
v6.0-rc4
v6.0-rc5
v6.0-rc6
v6.0-rc7
v6.0.1
v6.0.10
v6.0.11
v6.0.12
v6.0.13
v6.0.14
v6.0.15
v6.0.16
v6.0.17
v6.0.2
v6.0.3
v6.0.4
v6.0.5
v6.0.6
v6.0.7
v6.0.8
v6.0.9
v6.1
v6.1-rc1
v6.1-rc2
v6.1-rc3
v6.1-rc4
v6.1-rc5
v6.1-rc6
v6.1-rc7
v6.1-rc8
v6.1.1
v6.1.2
v6.1.3

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50765.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.19.0
Fixed
6.0.18
Type
ECOSYSTEM
Events
Introduced
6.1.0
Fixed
6.1.4

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50765.json"