CVE-2022-50434

Source
https://cve.org/CVERecord?id=CVE-2022-50434
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50434.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-50434
Downstream
Related
Published
2025-10-01T11:42:12.160Z
Modified
2026-04-02T08:28:30.439078Z
Summary
blk-mq: fix possible memleak when register 'hctx' failed
Details

In the Linux kernel, the following vulnerability has been resolved:

blk-mq: fix possible memleak when register 'hctx' failed

There's issue as follows when do fault injection test: unreferenced object 0xffff888132a9f400 (size 512): comm "insmod", pid 308021, jiffies 4324277909 (age 509.733s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 08 f4 a9 32 81 88 ff ff ...........2.... 08 f4 a9 32 81 88 ff ff 00 00 00 00 00 00 00 00 ...2............ backtrace: [<00000000e8952bb4>] kmallocnodetrace+0x22/0xa0 [<00000000f9980e0f>] blkmqallocandinithctx+0x3f1/0x7e0 [<000000002e719efa>] blkmqreallochwctxs+0x1e6/0x230 [<000000004f1fda40>] blkmqinitallocated_queue+0x27e/0x910 [<00000000287123ec>] __blkmqallocdisk+0x67/0xf0 [<00000000a2a34657>] 0xffffffffa2ad310f [<00000000b173f718>] 0xffffffffa2af824a [<0000000095a1dabb>] dooneinitcall+0x87/0x2a0 [<00000000f32fdf93>] doinitmodule+0xdf/0x320 [<00000000cbe8541e>] loadmodule+0x3006/0x3390 [<0000000069ed1bdb>] _dosysfinitmodule+0x113/0x1b0 [<00000000a1a29ae8>] dosyscall64+0x35/0x80 [<000000009cd878b0>] entrySYSCALL64afterhwframe+0x46/0xb0

Fault injection context as follows: kobjectadd blkmqregisterhctx blkmqsysfsregister blkregisterqueue deviceadddisk nulladddev.part.0 [nullblk]

As 'blkmqregisterhctx' may already add some objects when failed halfway, but there isn't do fallback, caller don't know which objects add failed. To solve above issue just do fallback when add objects failed halfway in 'blkmqregisterhctx'.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50434.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
67aec14ce87fe25bdfff7dbf468556333df11c4e
Fixed
654870789c3c1b9763316ef1c71d7a449127b175
Fixed
cb186eb47fb9dd327bdefa15f0c5fc55c53a40dd
Fixed
02bc8bc6eab03c84373281b85cb6e98747172ff7
Fixed
87fd18016a47ea8ae12641377a390172c4aa97a7
Fixed
e8022da1fa2fdf2fa204b445dd3354e7a66d085a
Fixed
eff45bfbc25a2509a6362dea6e699e14083c693c
Fixed
4b7fafa5f39b15c3a6ca3b95e534d05d6904cc95
Fixed
33e8a3f61814ea30615d0fafaf50477975d6c1ca
Fixed
4b7a21c57b14fbcd0e1729150189e5933f5088e9

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50434.json"