In the Linux kernel, the following vulnerability has been resolved:
block: Fix possible memory leak for rqwb on adddisk failure
kmemleak reported memory leaks in deviceadddisk():
kmemleak: 3 new suspected memory leaks
unreferenced object 0xffff88800f420800 (size 512): comm "modprobe", pid 4275, jiffies 4295639067 (age 223.512s) hex dump (first 32 bytes): 04 00 00 00 08 00 00 00 01 00 00 00 00 00 00 00 ................ 00 e1 f5 05 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000d3662699>] kmalloctrace+0x26/0x60 [<00000000edc7aadc>] wbtinit+0x50/0x6f0 [<0000000069601d16>] wbtenabledefault+0x157/0x1c0 [<0000000028fc393f>] blkregisterqueue+0x2a4/0x420 [<000000007345a042>] deviceadddisk+0x6fd/0xe40 [<0000000060e6aab0>] nbddevadd+0x828/0xbf0 [nbd] ...
It is because the memory allocated in wbtenabledefault() is not released in deviceadddisk() error path. Normally, these memory are freed in:
delgendisk() rqqosexit() rqos->ops->exit(rqos); wbtexit()
So rqqosexit() is called to free the rqwb memory for wbtinit(). However in the error path of deviceadddisk(), only blkunregisterqueue() is called and make rq_wb memory leaked.
Add rqqosexit() to the error path to fix it.
[ { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4e68c5da60cd79950bd56287ae80b39d6261f995", "signature_version": "v1", "target": { "file": "block/genhd.c" }, "digest": { "line_hashes": [ "6362877676086571176667484368337669656", "207614276307501847100311526209238148544", "125406043246483210119316378575012691319", "147615999867186015715316015364178447672" ], "threshold": 0.9 }, "deprecated": false, "signature_type": "Line", "id": "CVE-2022-49902-106f81f1" }, { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4e68c5da60cd79950bd56287ae80b39d6261f995", "signature_version": "v1", "target": { "file": "block/genhd.c", "function": "device_add_disk" }, "digest": { "length": 2843.0, "function_hash": "278103657014190712276288901728056704938" }, "deprecated": false, "signature_type": "Function", "id": "CVE-2022-49902-577d8d07" }, { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@fa81cbafbf5764ad5053512152345fab37a1fe18", "signature_version": "v1", "target": { "file": "block/genhd.c", "function": "device_add_disk" }, "digest": { "length": 3081.0, "function_hash": "233349983686293884128070411923162697071" }, "deprecated": false, "signature_type": "Function", "id": "CVE-2022-49902-6661f57d" }, { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@528677d3b4af985445bd4ac667485ded1ed11220", "signature_version": "v1", "target": { "file": "block/genhd.c", "function": "device_add_disk" }, "digest": { "length": 2858.0, "function_hash": "146025340123954478450158698870295138120" }, "deprecated": false, "signature_type": "Function", "id": "CVE-2022-49902-7a10cb05" }, { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@fa81cbafbf5764ad5053512152345fab37a1fe18", "signature_version": "v1", "target": { "file": "block/genhd.c" }, "digest": { "line_hashes": [ "6362877676086571176667484368337669656", "207614276307501847100311526209238148544", "125406043246483210119316378575012691319", "147615999867186015715316015364178447672" ], "threshold": 0.9 }, "deprecated": false, "signature_type": "Line", "id": "CVE-2022-49902-c1ca1963" }, { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@528677d3b4af985445bd4ac667485ded1ed11220", "signature_version": "v1", "target": { "file": "block/genhd.c" }, "digest": { "line_hashes": [ "6362877676086571176667484368337669656", "207614276307501847100311526209238148544", "125406043246483210119316378575012691319", "147615999867186015715316015364178447672" ], "threshold": 0.9 }, "deprecated": false, "signature_type": "Line", "id": "CVE-2022-49902-e5418396" } ]