{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2022-50765","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2025-12-24T13:02:21.546Z","datePublished":"2025-12-24T13:05:56.123Z","dateUpdated":"2026-05-11T19:25:06.575Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T19:25:06.575Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nRISC-V: kexec: Fix memory leak of elf header buffer\n\nThis is reported by kmemleak detector:\n\nunreferenced object 0xff2000000403d000 (size 4096):\n  comm \"kexec\", pid 146, jiffies 4294900633 (age 64.792s)\n  hex dump (first 32 bytes):\n    7f 45 4c 46 02 01 01 00 00 00 00 00 00 00 00 00  .ELF............\n    04 00 f3 00 01 00 00 00 00 00 00 00 00 00 00 00  ................\n  backtrace:\n    [<00000000566ca97c>] kmemleak_vmalloc+0x3c/0xbe\n    [<00000000979283d8>] __vmalloc_node_range+0x3ac/0x560\n    [<00000000b4b3712a>] __vmalloc_node+0x56/0x62\n    [<00000000854f75e2>] vzalloc+0x2c/0x34\n    [<00000000e9a00db9>] crash_prepare_elf64_headers+0x80/0x30c\n    [<0000000067e8bf48>] elf_kexec_load+0x3e8/0x4ec\n    [<0000000036548e09>] kexec_image_load_default+0x40/0x4c\n    [<0000000079fbe1b4>] sys_kexec_file_load+0x1c4/0x322\n    [<0000000040c62c03>] ret_from_syscall+0x0/0x2\n\nIn elf_kexec_load(), a buffer is allocated via vzalloc() to store elf\nheaders.  While it's not freed back to system when kdump kernel is\nreloaded or unloaded, or when image->elf_header is successfully set and\nthen fails to load kdump kernel for some reason. Fix it by freeing the\nbuffer in arch_kimage_file_post_load_cleanup()."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["arch/riscv/kernel/elf_kexec.c"],"versions":[{"version":"8acea455fafaf2620b247de6c00774828b618a82","lessThan":"090bfcfc9f14d05154893c67eeaecc56e894fbae","status":"affected","versionType":"git"},{"version":"8acea455fafaf2620b247de6c00774828b618a82","lessThan":"cdea2da6787583ecca43594132533a2ac8d7cd21","status":"affected","versionType":"git"},{"version":"8acea455fafaf2620b247de6c00774828b618a82","lessThan":"cbc32023ddbdf4baa3d9dc513a2184a84080a5a2","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["arch/riscv/kernel/elf_kexec.c"],"versions":[{"version":"5.19","status":"affected"},{"version":"0","lessThan":"5.19","status":"unaffected","versionType":"semver"},{"version":"6.0.18","lessThanOrEqual":"6.0.*","status":"unaffected","versionType":"semver"},{"version":"6.1.4","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.2","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.19","versionEndExcluding":"6.0.18"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.19","versionEndExcluding":"6.1.4"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.19","versionEndExcluding":"6.2"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/090bfcfc9f14d05154893c67eeaecc56e894fbae"},{"url":"https://git.kernel.org/stable/c/cdea2da6787583ecca43594132533a2ac8d7cd21"},{"url":"https://git.kernel.org/stable/c/cbc32023ddbdf4baa3d9dc513a2184a84080a5a2"}],"title":"RISC-V: kexec: Fix memory leak of elf header buffer","x_generator":{"engine":"bippy-1.2.0"}}}}