- Description
- In the Linux kernel, the following vulnerability has been resolved: mm/mempolicy: fix mpol_new leak in shared_policy_replace If mpol_new is allocated but not used in restart loop, mpol_new will be freed via mpol_put before returning to the caller. But refcnt is not initialized yet, so mpol_put could not do the right things and might leak the unused mpol_new. This would happen if mempolicy was updated on the shared shmem file while the sp->lock has been dropped during the memory allocation. This issue could be triggered easily with the below code snippet if there are many processes doing the below work at the same time: shmid = shmget((key_t)5566, 1024 * PAGE_SIZE, 0666|IPC_CREAT); shm = shmat(shmid, 0, 0); loop many times { mbind(shm, 1024 * PAGE_SIZE, MPOL_LOCAL, mask, maxnode, 0); mbind(shm + 128 * PAGE_SIZE, 128 * PAGE_SIZE, MPOL_DEFAULT, mask, maxnode, 0); }
- Source
- 416baaa9-dc9f-4396-8d5f-8c081fb06d67
- NVD status
- Analyzed
- Products
- linux_kernel
CVSS 3.1
- Type
- Primary
- Base score
- 5.5
- Impact score
- 3.6
- Exploitability score
- 1.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
- Severity
- MEDIUM
- nvd@nist.gov
- CWE-401
- Hype score
- Not currently trending
🚨 Breaking: Linux Kernel Patch Alert! SUSE’s Live Patch 33 fixes: CVE-2022-49080 (Privilege escalation) CVE-2024-57996 (Network DoS) CVSS: Up to 8.5 – Patch now: Read more:👉 https://t.co/HAQtgaoOIk #Infosec #Linux https://t.co/E1l35IvqFw
@Cezar_H_Linux
14 Jun 2025
49 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
📢 Critical Linux kernel update alert! SUSE’s latest live patch addresses memory leaks (CVE-2022-49080) and network scheduling flaws (CVE-2024-57996). Enterprise users: prioritize this. Read more: 👇 https://t.co/PBpluwri4t #LinuxSecurity #SysAdmin #SUSE https://t.co/rAww
@Cezar_H_Linux
13 Jun 2025
64 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 SUSE Kernel Patch Alert: Live Patch 36 fixes: CVE-2022-49080 (7.3 CVSS) CVE-2024-57996 (8.5 CVSS) Patch via zypper or YaST. Details: 👉 https://t.co/4iHSRM0XU1 #LinuxSecurity #SysAdmin https://t.co/3aPKUYHjUg
@Cezar_H_Linux
13 Jun 2025
40 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
📢Breaking down #SUSE’s critical kernel patches (5.3.18-150300_59_179): CVE-2022-49080: Memory policy leak → privilege escalation risk CVE-2024-57996: SFQ scheduler flaw → DoS vector Read more: : 👉https://t.co/F68OheehdX #LinuxSecurity" https://t.co/8svmEjGLWX
@Cezar_H_Linux
11 Jun 2025
65 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C95B5F4F-421D-43B3-98BF-C395D41D59BC",
"versionEndExcluding": "4.9.311",
"versionStartIncluding": "3.8.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6D9B028C-6313-47F9-94B7-5F8122345E49",
"versionEndExcluding": "4.14.276",
"versionStartIncluding": "4.10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FA28527A-11D3-41D2-9C4C-ECAC0D6A4A2D",
"versionEndExcluding": "4.19.238",
"versionStartIncluding": "4.15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8CB6E8F5-C2B1-46F3-A807-0F6104AC340F",
"versionEndExcluding": "5.4.189",
"versionStartIncluding": "4.20",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "96258501-7BCE-4C55-8A38-8AC9D327626D",
"versionEndExcluding": "5.10.111",
"versionStartIncluding": "5.5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D25878D3-7761-4E9F-8919-E92CD53896E0",
"versionEndExcluding": "5.15.34",
"versionStartIncluding": "5.11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "ABBBA66E-0244-4621-966B-9790AF1EEB00",
"versionEndExcluding": "5.16.20",
"versionStartIncluding": "5.16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AE420AC7-1E59-4398-B84F-71F4B4337762",
"versionEndExcluding": "5.17.3",
"versionStartIncluding": "5.17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.8:-:*:*:*:*:*:*",
"matchCriteriaId": "BEE536AD-20BA-4893-AF2B-B6CF446F5FB3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.8:rc2:*:*:*:*:*:*",
"matchCriteriaId": "30456934-2CAE-4F0C-B361-4E2C10DE8DD8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.8:rc3:*:*:*:*:*:*",
"matchCriteriaId": "6E108893-AAAF-48F4-9376-71AC33C7A40E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.8:rc4:*:*:*:*:*:*",
"matchCriteriaId": "AC348729-8654-4178-851F-5C4BE4B5C806",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.8:rc5:*:*:*:*:*:*",
"matchCriteriaId": "1A29F057-1966-4A35-83AE-844FF160388B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.8:rc6:*:*:*:*:*:*",
"matchCriteriaId": "FC426C5C-DA23-494D-888F-4E3712EBA3E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.8:rc7:*:*:*:*:*:*",
"matchCriteriaId": "70810C1C-2B24-47DF-9357-E9D755D1BE99",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:5.18:rc1:*:*:*:*:*:*",
"matchCriteriaId": "6AD94161-84BB-42E6-9882-4FC0C42E9FC1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
]