CVE-2022-50352
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
16/09/2025
Last modified:
17/09/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
net: hns: fix possible memory leak in hnae_ae_register()<br />
<br />
Inject fault while probing module, if device_register() fails,<br />
but the refcount of kobject is not decreased to 0, the name<br />
allocated in dev_set_name() is leaked. Fix this by calling<br />
put_device(), so that name can be freed in callback function<br />
kobject_cleanup().<br />
<br />
unreferenced object 0xffff00c01aba2100 (size 128):<br />
comm "systemd-udevd", pid 1259, jiffies 4294903284 (age 294.152s)<br />
hex dump (first 32 bytes):<br />
68 6e 61 65 30 00 00 00 18 21 ba 1a c0 00 ff ff hnae0....!......<br />
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................<br />
backtrace:<br />
[] slab_post_alloc_hook+0xa0/0x3e0<br />
[] __kmem_cache_alloc_node+0x164/0x2b0<br />
[] __kmalloc_node_track_caller+0x6c/0x390<br />
[] kvasprintf+0x8c/0x118<br />
[] kvasprintf_const+0x60/0xc8<br />
[] kobject_set_name_vargs+0x3c/0xc0<br />
[] dev_set_name+0x7c/0xa0<br />
[] hnae_ae_register+0xcc/0x190 [hnae]<br />
[] hns_dsaf_ae_init+0x9c/0x108 [hns_dsaf]<br />
[] hns_dsaf_probe+0x548/0x748 [hns_dsaf]
Impact
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/02dc0db19d944b4a90941db505ecf1aaec714be4
- https://git.kernel.org/stable/c/2974f3b330ef25f5d34a4948d04290c2cd7802cf
- https://git.kernel.org/stable/c/3b78453cca046d3b03853f0d077ad3ad130db886
- https://git.kernel.org/stable/c/7ae1345f6ad715acbcdc9e1ac28153684fd498bb
- https://git.kernel.org/stable/c/91f8f5342bee726ed5692583d58f69e7cc9ae60e
- https://git.kernel.org/stable/c/a3c148955c22fe1d94d7a2096005679c1f22eddf
- https://git.kernel.org/stable/c/dfc0337c6dceb6449403b33ecb141f4a1458a1e9
- https://git.kernel.org/stable/c/ff2f5ec5d009844ec28f171123f9e58750cef4bf