{
  "threat_severity" : "Low",
  "public_date" : "2025-06-18T00:00:00Z",
  "bugzilla" : {
    "description" : "kernel: openvswitch: fix memory leak at failed datapath creation",
    "id" : "2373521",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2373521"
  },
  "cvss3" : {
    "cvss3_base_score" : "5.5",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
    "status" : "verified"
  },
  "cwe" : "CWE-401",
  "details" : [ "In the Linux kernel, the following vulnerability has been resolved:\nopenvswitch: fix memory leak at failed datapath creation\novs_dp_cmd_new()->ovs_dp_change()->ovs_dp_set_upcall_portids()\nallocates array via kmalloc.\nIf for some reason new_vport() fails during ovs_dp_cmd_new()\ndp->upcall_portids must be freed.\nAdd missing kfree.\nKmemleak example:\nunreferenced object 0xffff88800c382500 (size 64):\ncomm \"dump_state\", pid 323, jiffies 4294955418 (age 104.347s)\nhex dump (first 32 bytes):\n5e c2 79 e4 1f 7a 38 c7 09 21 38 0c 80 88 ff ff  ^.y..z8..!8.....\n03 00 00 00 0a 00 00 00 14 00 00 00 28 00 00 00  ............(...\nbacktrace:\n[<0000000071bebc9f>] ovs_dp_set_upcall_portids+0x38/0xa0\n[<000000000187d8bd>] ovs_dp_change+0x63/0xe0\n[<000000002397e446>] ovs_dp_cmd_new+0x1f0/0x380\n[<00000000aa06f36e>] genl_family_rcv_msg_doit+0xea/0x150\n[<000000008f583bc4>] genl_rcv_msg+0xdc/0x1e0\n[<00000000fa10e377>] netlink_rcv_skb+0x50/0x100\n[<000000004959cece>] genl_rcv+0x24/0x40\n[<000000004699ac7f>] netlink_unicast+0x23e/0x360\n[<00000000c153573e>] netlink_sendmsg+0x24e/0x4b0\n[<000000006f4aa380>] sock_sendmsg+0x62/0x70\n[<00000000d0068654>] ____sys_sendmsg+0x230/0x270\n[<0000000012dacf7d>] ___sys_sendmsg+0x88/0xd0\n[<0000000011776020>] __sys_sendmsg+0x59/0xa0\n[<000000002e8f2dc1>] do_syscall_64+0x3b/0x90\n[<000000003243e7cb>] entry_SYSCALL_64_after_hwframe+0x63/0xcd", "A flaw was found in the openvswitch module in the Linux kernel. A missing release of allocated memory when an error occurs will cause a memory leak, potentially impacting system performance and resulting in a denial of service." ],
  "statement" : "This issue has been fixed in Red Hat Enterprise Linux 8.8 and 9.2 via RHSA-2023:2951 [1] and RHSA-2023:2458 [2], respectively.\n[1]. https://access.redhat.com/errata/RHSA-2023:2951\n[2]. https://access.redhat.com/errata/RHSA-2023:2458",
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2023-05-16T00:00:00Z",
    "advisory" : "RHSA-2023:2951",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8",
    "package" : "kernel-0:4.18.0-477.10.1.el8_8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2023-05-09T00:00:00Z",
    "advisory" : "RHSA-2023:2458",
    "cpe" : "cpe:/a:redhat:enterprise_linux:9",
    "package" : "kernel-0:5.14.0-284.11.1.el9_2"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2023-05-09T00:00:00Z",
    "advisory" : "RHSA-2023:2458",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9",
    "package" : "kernel-0:5.14.0-284.11.1.el9_2"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 10",
    "fix_state" : "Not affected",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:10"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Out of support scope",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Out of support scope",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Out of support scope",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Out of support scope",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "fix_state" : "Fix deferred",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2022-49959\nhttps://nvd.nist.gov/vuln/detail/CVE-2022-49959\nhttps://lore.kernel.org/linux-cve-announce/2025061813-CVE-2022-49959-d2b7@gregkh/T" ],
  "name" : "CVE-2022-49959",
  "csaw" : false
}