Instituto Nacional de ciberseguridad. Sección Incibe
Instituto Nacional de Ciberseguridad. Sección INCIBE-CERT

CVE-2022-50639

Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
09/12/2025
Última modificación:
09/12/2025

Descripción

*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> io-wq: Fix memory leak in worker creation<br /> <br /> If the CPU mask allocation for a node fails, then the memory allocated for<br /> the &amp;#39;io_wqe&amp;#39; struct of the current node doesn&amp;#39;t get freed on the error<br /> handling path, since it has not yet been added to the &amp;#39;wqes&amp;#39; array.<br /> <br /> This was spotted when fuzzing v6.1-rc1 with Syzkaller:<br /> BUG: memory leak<br /> unreferenced object 0xffff8880093d5000 (size 1024):<br /> comm "syz-executor.2", pid 7701, jiffies 4295048595 (age 13.900s)<br /> hex dump (first 32 bytes):<br /> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................<br /> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................<br /> backtrace:<br /> [] __kmem_cache_alloc_node+0x18e/0x720<br /> [] kmalloc_node_trace+0x2a/0x130<br /> [] io_wq_create+0x7b9/0xdc0<br /> [] io_uring_alloc_task_context+0x31e/0x59d<br /> [] __io_uring_add_tctx_node.cold+0x19/0x1ba<br /> [] io_uring_setup.cold+0x1b80/0x1dce<br /> [] __x64_sys_io_uring_setup+0x5d/0x80<br /> [] do_syscall_64+0x5d/0x90<br /> [] entry_SYSCALL_64_after_hwframe+0x63/0xcd

Impacto