๐Ÿ” CVE Alert

CVE-2022-49853

MEDIUM 5.5

net: macvlan: fix memory leaks of macvlan_common_newlink

CVSS Score
5.5
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: net: macvlan: fix memory leaks of macvlan_common_newlink kmemleak reports memory leaks in macvlan_common_newlink, as follows: ip link add link eth0 name .. type macvlan mode source macaddr add <MAC-ADDR> kmemleak reports: unreferenced object 0xffff8880109bb140 (size 64): comm "ip", pid 284, jiffies 4294986150 (age 430.108s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 b8 aa 5a 12 80 88 ff ff ..........Z..... 80 1b fa 0d 80 88 ff ff 1e ff ac af c7 c1 6b 6b ..............kk backtrace: [<ffffffff813e06a7>] kmem_cache_alloc_trace+0x1c7/0x300 [<ffffffff81b66025>] macvlan_hash_add_source+0x45/0xc0 [<ffffffff81b66a67>] macvlan_changelink_sources+0xd7/0x170 [<ffffffff81b6775c>] macvlan_common_newlink+0x38c/0x5a0 [<ffffffff81b6797e>] macvlan_newlink+0xe/0x20 [<ffffffff81d97f8f>] __rtnl_newlink+0x7af/0xa50 [<ffffffff81d98278>] rtnl_newlink+0x48/0x70 ... In the scenario where the macvlan mode is configured as 'source', macvlan_changelink_sources() will be execured to reconfigure list of remote source mac addresses, at the same time, if register_netdevice() return an error, the resource generated by macvlan_changelink_sources() is not cleaned up. Using this patch, in the case of an error, it will execute macvlan_flush_sources() to ensure that the resource is cleaned up.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published May 1, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new medium vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
aa5fd0fb77486b8a6764ead8627baa14790e4280 < 9f288e338be206713d79b29144c27fca4503c39b aa5fd0fb77486b8a6764ead8627baa14790e4280 < 21d3a8b6a1e39e7529ce9de07316ee13a63f305b aa5fd0fb77486b8a6764ead8627baa14790e4280 < a81b44d1df1f07f00c0dcc0a0b3d2fa24a46289e aa5fd0fb77486b8a6764ead8627baa14790e4280 < 685e73e3f7a9fb75cbf049a9d0b7c45cc6b57b2e aa5fd0fb77486b8a6764ead8627baa14790e4280 < 956e0216a19994443c90ba2ea6b0b284c9c4f9cb aa5fd0fb77486b8a6764ead8627baa14790e4280 < a8d67367ab33604326cc37ab44fd1801bf5691ba aa5fd0fb77486b8a6764ead8627baa14790e4280 < 9ea003c4671b2fc455320ecf6d4a43b0a3c1878a aa5fd0fb77486b8a6764ead8627baa14790e4280 < 23569b5652ee8e8e55a12f7835f59af6f3cefc30
Linux / Linux
4.9

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/9f288e338be206713d79b29144c27fca4503c39b git.kernel.org: https://git.kernel.org/stable/c/21d3a8b6a1e39e7529ce9de07316ee13a63f305b git.kernel.org: https://git.kernel.org/stable/c/a81b44d1df1f07f00c0dcc0a0b3d2fa24a46289e git.kernel.org: https://git.kernel.org/stable/c/685e73e3f7a9fb75cbf049a9d0b7c45cc6b57b2e git.kernel.org: https://git.kernel.org/stable/c/956e0216a19994443c90ba2ea6b0b284c9c4f9cb git.kernel.org: https://git.kernel.org/stable/c/a8d67367ab33604326cc37ab44fd1801bf5691ba git.kernel.org: https://git.kernel.org/stable/c/9ea003c4671b2fc455320ecf6d4a43b0a3c1878a git.kernel.org: https://git.kernel.org/stable/c/23569b5652ee8e8e55a12f7835f59af6f3cefc30