CVE-2022-50434
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
01/10/2025
Last modified:
23/01/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
blk-mq: fix possible memleak when register &#39;hctx&#39; failed<br />
<br />
There&#39;s issue as follows when do fault injection test:<br />
unreferenced object 0xffff888132a9f400 (size 512):<br />
comm "insmod", pid 308021, jiffies 4324277909 (age 509.733s)<br />
hex dump (first 32 bytes):<br />
00 00 00 00 00 00 00 00 08 f4 a9 32 81 88 ff ff ...........2....<br />
08 f4 a9 32 81 88 ff ff 00 00 00 00 00 00 00 00 ...2............<br />
backtrace:<br />
[] kmalloc_node_trace+0x22/0xa0<br />
[] blk_mq_alloc_and_init_hctx+0x3f1/0x7e0<br />
[] blk_mq_realloc_hw_ctxs+0x1e6/0x230<br />
[] blk_mq_init_allocated_queue+0x27e/0x910<br />
[] __blk_mq_alloc_disk+0x67/0xf0<br />
[] 0xffffffffa2ad310f<br />
[] 0xffffffffa2af824a<br />
[] do_one_initcall+0x87/0x2a0<br />
[] do_init_module+0xdf/0x320<br />
[] load_module+0x3006/0x3390<br />
[] __do_sys_finit_module+0x113/0x1b0<br />
[] do_syscall_64+0x35/0x80<br />
[] entry_SYSCALL_64_after_hwframe+0x46/0xb0<br />
<br />
Fault injection context as follows:<br />
kobject_add<br />
blk_mq_register_hctx<br />
blk_mq_sysfs_register<br />
blk_register_queue<br />
device_add_disk<br />
null_add_dev.part.0 [null_blk]<br />
<br />
As &#39;blk_mq_register_hctx&#39; may already add some objects when failed halfway,<br />
but there isn&#39;t do fallback, caller don&#39;t know which objects add failed.<br />
To solve above issue just do fallback when add objects failed halfway in<br />
&#39;blk_mq_register_hctx&#39;.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 3.16 (including) | 4.9.337 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.10 (including) | 4.14.303 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.15 (including) | 4.19.270 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.20 (including) | 5.4.229 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.163 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.86 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.0.16 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.1 (including) | 6.1.2 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/02bc8bc6eab03c84373281b85cb6e98747172ff7
- https://git.kernel.org/stable/c/33e8a3f61814ea30615d0fafaf50477975d6c1ca
- https://git.kernel.org/stable/c/4b7a21c57b14fbcd0e1729150189e5933f5088e9
- https://git.kernel.org/stable/c/4b7fafa5f39b15c3a6ca3b95e534d05d6904cc95
- https://git.kernel.org/stable/c/654870789c3c1b9763316ef1c71d7a449127b175
- https://git.kernel.org/stable/c/87fd18016a47ea8ae12641377a390172c4aa97a7
- https://git.kernel.org/stable/c/cb186eb47fb9dd327bdefa15f0c5fc55c53a40dd
- https://git.kernel.org/stable/c/e8022da1fa2fdf2fa204b445dd3354e7a66d085a
- https://git.kernel.org/stable/c/eff45bfbc25a2509a6362dea6e699e14083c693c



