CVE-2022-50702
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
24/12/2025
Última modificación:
29/12/2025
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
vdpa_sim: fix possible memory leak in vdpasim_net_init() and vdpasim_blk_init()<br />
<br />
Inject fault while probing module, if device_register() fails in<br />
vdpasim_net_init() or vdpasim_blk_init(), but the refcount of kobject is<br />
not decreased to 0, the name allocated in dev_set_name() is leaked.<br />
Fix this by calling put_device(), so that name can be freed in<br />
callback function kobject_cleanup().<br />
<br />
(vdpa_sim_net)<br />
unreferenced object 0xffff88807eebc370 (size 16):<br />
comm "modprobe", pid 3848, jiffies 4362982860 (age 18.153s)<br />
hex dump (first 16 bytes):<br />
76 64 70 61 73 69 6d 5f 6e 65 74 00 6b 6b 6b a5 vdpasim_net.kkk.<br />
backtrace:<br />
[] __kmalloc_node_track_caller+0x4e/0x150<br />
[] kstrdup+0x33/0x60<br />
[] kobject_set_name_vargs+0x41/0x110<br />
[] dev_set_name+0xab/0xe0<br />
[] device_add+0xe3/0x1a80<br />
[] 0xffffffffa0270013<br />
[] do_one_initcall+0x87/0x2e0<br />
[] do_init_module+0x1ab/0x640<br />
[] load_module+0x5d00/0x77f0<br />
[] __do_sys_finit_module+0x110/0x1b0<br />
[] do_syscall_64+0x35/0x80<br />
[] entry_SYSCALL_64_after_hwframe+0x46/0xb0<br />
<br />
(vdpa_sim_blk)<br />
unreferenced object 0xffff8881070c1250 (size 16):<br />
comm "modprobe", pid 6844, jiffies 4364069319 (age 17.572s)<br />
hex dump (first 16 bytes):<br />
76 64 70 61 73 69 6d 5f 62 6c 6b 00 6b 6b 6b a5 vdpasim_blk.kkk.<br />
backtrace:<br />
[] __kmalloc_node_track_caller+0x4e/0x150<br />
[] kstrdup+0x33/0x60<br />
[] kobject_set_name_vargs+0x41/0x110<br />
[] dev_set_name+0xab/0xe0<br />
[] device_add+0xe3/0x1a80<br />
[] 0xffffffffa0220013<br />
[] do_one_initcall+0x87/0x2e0<br />
[] do_init_module+0x1ab/0x640<br />
[] load_module+0x5d00/0x77f0<br />
[] __do_sys_finit_module+0x110/0x1b0<br />
[] do_syscall_64+0x35/0x80<br />
[] entry_SYSCALL_64_after_hwframe+0x46/0xb0



