In the Linux kernel, the following vulnerability has been resolved:
mm/damon/reclaim: fix potential memory leak in damonreclaiminit()
damonreclaiminit() allocates a memory chunk for ctx with damonnewctx(). When damonselectops() fails, ctx is not released, which will lead to a memory leak.
We should release the ctx with damondestroyctx() when damonselectops() fails to fix the memory leak.
[
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@700aa4e11a3c4d2a44d06758db431a013d9e1b61",
"target": {
"function": "damon_reclaim_init",
"file": "mm/damon/reclaim.c"
},
"deprecated": false,
"id": "CVE-2022-50088-1065ada3",
"signature_version": "v1",
"digest": {
"length": 489.0,
"function_hash": "141240103787027292881128547507105990266"
},
"signature_type": "Function"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@188043c7f4f2bd662f2a55957d684fffa543e600",
"target": {
"function": "damon_reclaim_init",
"file": "mm/damon/reclaim.c"
},
"deprecated": false,
"id": "CVE-2022-50088-1ff2dc49",
"signature_version": "v1",
"digest": {
"length": 489.0,
"function_hash": "141240103787027292881128547507105990266"
},
"signature_type": "Function"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@700aa4e11a3c4d2a44d06758db431a013d9e1b61",
"target": {
"file": "mm/damon/reclaim.c"
},
"deprecated": false,
"id": "CVE-2022-50088-561d6f23",
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"258401007391021944589230059167621319753",
"333868053013094252710365077147099200076",
"216427356369035920116067443717333252383",
"181970411697081743805982077017255034212",
"122109381572723384069873977927271438553"
]
},
"signature_type": "Line"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9d3e9e1e0856f4c905bbb870f16f42ae72477071",
"target": {
"file": "mm/damon/reclaim.c"
},
"deprecated": false,
"id": "CVE-2022-50088-5ff05930",
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"258401007391021944589230059167621319753",
"333868053013094252710365077147099200076",
"46345870959605970312964323860093181008",
"66793279562090567174252576868288552990",
"251171889880135502806912891124233315768"
]
},
"signature_type": "Line"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9d3e9e1e0856f4c905bbb870f16f42ae72477071",
"target": {
"function": "damon_reclaim_init",
"file": "mm/damon/reclaim.c"
},
"deprecated": false,
"id": "CVE-2022-50088-77f8da02",
"signature_version": "v1",
"digest": {
"length": 380.0,
"function_hash": "335171406044245395818006587007099972153"
},
"signature_type": "Function"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@188043c7f4f2bd662f2a55957d684fffa543e600",
"target": {
"file": "mm/damon/reclaim.c"
},
"deprecated": false,
"id": "CVE-2022-50088-e7c5280c",
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"258401007391021944589230059167621319753",
"333868053013094252710365077147099200076",
"216427356369035920116067443717333252383",
"181970411697081743805982077017255034212",
"122109381572723384069873977927271438553"
]
},
"signature_type": "Line"
}
]