In the Linux kernel, the following vulnerability has been resolved:
block: Fix possible memory leak for rqwb on adddisk failure
kmemleak reported memory leaks in deviceadddisk():
kmemleak: 3 new suspected memory leaks
unreferenced object 0xffff88800f420800 (size 512): comm "modprobe", pid 4275, jiffies 4295639067 (age 223.512s) hex dump (first 32 bytes): 04 00 00 00 08 00 00 00 01 00 00 00 00 00 00 00 ................ 00 e1 f5 05 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000d3662699>] kmalloctrace+0x26/0x60 [<00000000edc7aadc>] wbtinit+0x50/0x6f0 [<0000000069601d16>] wbtenabledefault+0x157/0x1c0 [<0000000028fc393f>] blkregisterqueue+0x2a4/0x420 [<000000007345a042>] deviceadddisk+0x6fd/0xe40 [<0000000060e6aab0>] nbddevadd+0x828/0xbf0 [nbd] ...
It is because the memory allocated in wbtenabledefault() is not released in deviceadddisk() error path. Normally, these memory are freed in:
delgendisk() rqqosexit() rqos->ops->exit(rqos); wbtexit()
So rqqosexit() is called to free the rqwb memory for wbtinit(). However in the error path of deviceadddisk(), only blkunregisterqueue() is called and make rq_wb memory leaked.
Add rqqosexit() to the error path to fix it.
{
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49902.json",
"cna_assigner": "Linux"
}[
{
"signature_type": "Line",
"signature_version": "v1",
"target": {
"file": "block/genhd.c"
},
"id": "CVE-2022-49902-106f81f1",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4e68c5da60cd79950bd56287ae80b39d6261f995",
"digest": {
"line_hashes": [
"6362877676086571176667484368337669656",
"207614276307501847100311526209238148544",
"125406043246483210119316378575012691319",
"147615999867186015715316015364178447672"
],
"threshold": 0.9
}
},
{
"signature_type": "Function",
"signature_version": "v1",
"target": {
"file": "block/genhd.c",
"function": "device_add_disk"
},
"id": "CVE-2022-49902-577d8d07",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4e68c5da60cd79950bd56287ae80b39d6261f995",
"digest": {
"function_hash": "278103657014190712276288901728056704938",
"length": 2843.0
}
},
{
"signature_type": "Function",
"signature_version": "v1",
"target": {
"file": "block/genhd.c",
"function": "device_add_disk"
},
"id": "CVE-2022-49902-6661f57d",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@fa81cbafbf5764ad5053512152345fab37a1fe18",
"digest": {
"function_hash": "233349983686293884128070411923162697071",
"length": 3081.0
}
},
{
"signature_type": "Function",
"signature_version": "v1",
"target": {
"file": "block/genhd.c",
"function": "device_add_disk"
},
"id": "CVE-2022-49902-7a10cb05",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@528677d3b4af985445bd4ac667485ded1ed11220",
"digest": {
"function_hash": "146025340123954478450158698870295138120",
"length": 2858.0
}
},
{
"signature_type": "Line",
"signature_version": "v1",
"target": {
"file": "block/genhd.c"
},
"id": "CVE-2022-49902-c1ca1963",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@fa81cbafbf5764ad5053512152345fab37a1fe18",
"digest": {
"line_hashes": [
"6362877676086571176667484368337669656",
"207614276307501847100311526209238148544",
"125406043246483210119316378575012691319",
"147615999867186015715316015364178447672"
],
"threshold": 0.9
}
},
{
"signature_type": "Line",
"signature_version": "v1",
"target": {
"file": "block/genhd.c"
},
"id": "CVE-2022-49902-e5418396",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@528677d3b4af985445bd4ac667485ded1ed11220",
"digest": {
"line_hashes": [
"6362877676086571176667484368337669656",
"207614276307501847100311526209238148544",
"125406043246483210119316378575012691319",
"147615999867186015715316015364178447672"
],
"threshold": 0.9
}
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-49902.json"