{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2022-49784","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2025-05-01T14:05:17.223Z","datePublished":"2025-05-01T14:09:17.695Z","dateUpdated":"2026-05-11T19:06:42.965Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T19:06:42.965Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nperf/x86/amd/uncore: Fix memory leak for events array\n\nWhen a CPU comes online, the per-CPU NB and LLC uncore contexts are\nfreed but not the events array within the context structure. This\ncauses a memory leak as identified by the kmemleak detector.\n\n  [...]\n  unreferenced object 0xffff8c5944b8e320 (size 32):\n    comm \"swapper/0\", pid 1, jiffies 4294670387 (age 151.072s)\n    hex dump (first 32 bytes):\n      00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................\n      00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................\n    backtrace:\n      [<000000000759fb79>] amd_uncore_cpu_up_prepare+0xaf/0x230\n      [<00000000ddc9e126>] cpuhp_invoke_callback+0x2cf/0x470\n      [<0000000093e727d4>] cpuhp_issue_call+0x14d/0x170\n      [<0000000045464d54>] __cpuhp_setup_state_cpuslocked+0x11e/0x330\n      [<0000000069f67cbd>] __cpuhp_setup_state+0x6b/0x110\n      [<0000000015365e0f>] amd_uncore_init+0x260/0x321\n      [<00000000089152d2>] do_one_initcall+0x3f/0x1f0\n      [<000000002d0bd18d>] kernel_init_freeable+0x1ca/0x212\n      [<0000000030be8dde>] kernel_init+0x11/0x120\n      [<0000000059709e59>] ret_from_fork+0x22/0x30\n  unreferenced object 0xffff8c5944b8dd40 (size 64):\n    comm \"swapper/0\", pid 1, jiffies 4294670387 (age 151.072s)\n    hex dump (first 32 bytes):\n      00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................\n      00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................\n    backtrace:\n      [<00000000306efe8b>] amd_uncore_cpu_up_prepare+0x183/0x230\n      [<00000000ddc9e126>] cpuhp_invoke_callback+0x2cf/0x470\n      [<0000000093e727d4>] cpuhp_issue_call+0x14d/0x170\n      [<0000000045464d54>] __cpuhp_setup_state_cpuslocked+0x11e/0x330\n      [<0000000069f67cbd>] __cpuhp_setup_state+0x6b/0x110\n      [<0000000015365e0f>] amd_uncore_init+0x260/0x321\n      [<00000000089152d2>] do_one_initcall+0x3f/0x1f0\n      [<000000002d0bd18d>] kernel_init_freeable+0x1ca/0x212\n      [<0000000030be8dde>] kernel_init+0x11/0x120\n      [<0000000059709e59>] ret_from_fork+0x22/0x30\n  [...]\n\nFix the problem by freeing the events array before freeing the uncore\ncontext."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["arch/x86/events/amd/uncore.c"],"versions":[{"version":"39621c5808f5dda75d03dc4b2d4d2b13a5a1c34b","lessThan":"f75be9885d49e3717de962345c4572ddab52b178","status":"affected","versionType":"git"},{"version":"39621c5808f5dda75d03dc4b2d4d2b13a5a1c34b","lessThan":"bdfe34597139cfcecd47a2eb97fea44d77157491","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["arch/x86/events/amd/uncore.c"],"versions":[{"version":"6.0","status":"affected"},{"version":"0","lessThan":"6.0","status":"unaffected","versionType":"semver"},{"version":"6.0.10","lessThanOrEqual":"6.0.*","status":"unaffected","versionType":"semver"},{"version":"6.1","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.0","versionEndExcluding":"6.0.10"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.0","versionEndExcluding":"6.1"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/f75be9885d49e3717de962345c4572ddab52b178"},{"url":"https://git.kernel.org/stable/c/bdfe34597139cfcecd47a2eb97fea44d77157491"}],"title":"perf/x86/amd/uncore: Fix memory leak for events array","x_generator":{"engine":"bippy-1.2.0"}}}}