GHSA-556C-4MVG-6PQR

Vulnerability from github – Published: 2025-12-09 03:31 – Updated: 2025-12-09 03:31
VLAI?
Details

In the Linux kernel, the following vulnerability has been resolved:

io-wq: Fix memory leak in worker creation

If the CPU mask allocation for a node fails, then the memory allocated for the 'io_wqe' struct of the current node doesn't get freed on the error handling path, since it has not yet been added to the 'wqes' array.

This was spotted when fuzzing v6.1-rc1 with Syzkaller: BUG: memory leak unreferenced object 0xffff8880093d5000 (size 1024): comm "syz-executor.2", pid 7701, jiffies 4295048595 (age 13.900s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000cb463369>] __kmem_cache_alloc_node+0x18e/0x720 [<00000000147a3f9c>] kmalloc_node_trace+0x2a/0x130 [<000000004e107011>] io_wq_create+0x7b9/0xdc0 [<00000000c38b2018>] io_uring_alloc_task_context+0x31e/0x59d [<00000000867399da>] __io_uring_add_tctx_node.cold+0x19/0x1ba [<000000007e0e7a79>] io_uring_setup.cold+0x1b80/0x1dce [<00000000b545e9f6>] __x64_sys_io_uring_setup+0x5d/0x80 [<000000008a8a7508>] do_syscall_64+0x5d/0x90 [<000000004ac08bec>] entry_SYSCALL_64_after_hwframe+0x63/0xcd

Show details on source website

{
  "affected": [],
  "aliases": [
    "CVE-2022-50639"
  ],
  "database_specific": {
    "cwe_ids": [],
    "github_reviewed": false,
    "github_reviewed_at": null,
    "nvd_published_at": "2025-12-09T01:16:46Z",
    "severity": null
  },
  "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nio-wq: Fix memory leak in worker creation\n\nIf the CPU mask allocation for a node fails, then the memory allocated for\nthe \u0027io_wqe\u0027 struct of the current node doesn\u0027t get freed on the error\nhandling path, since it has not yet been added to the \u0027wqes\u0027 array.\n\nThis was spotted when fuzzing v6.1-rc1 with Syzkaller:\nBUG: memory leak\nunreferenced object 0xffff8880093d5000 (size 1024):\n  comm \"syz-executor.2\", pid 7701, jiffies 4295048595 (age 13.900s)\n  hex dump (first 32 bytes):\n    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................\n    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................\n  backtrace:\n    [\u003c00000000cb463369\u003e] __kmem_cache_alloc_node+0x18e/0x720\n    [\u003c00000000147a3f9c\u003e] kmalloc_node_trace+0x2a/0x130\n    [\u003c000000004e107011\u003e] io_wq_create+0x7b9/0xdc0\n    [\u003c00000000c38b2018\u003e] io_uring_alloc_task_context+0x31e/0x59d\n    [\u003c00000000867399da\u003e] __io_uring_add_tctx_node.cold+0x19/0x1ba\n    [\u003c000000007e0e7a79\u003e] io_uring_setup.cold+0x1b80/0x1dce\n    [\u003c00000000b545e9f6\u003e] __x64_sys_io_uring_setup+0x5d/0x80\n    [\u003c000000008a8a7508\u003e] do_syscall_64+0x5d/0x90\n    [\u003c000000004ac08bec\u003e] entry_SYSCALL_64_after_hwframe+0x63/0xcd",
  "id": "GHSA-556c-4mvg-6pqr",
  "modified": "2025-12-09T03:31:09Z",
  "published": "2025-12-09T03:31:09Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50639"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/996d3efeb091c503afd3ee6b5e20eabf446fd955"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/b6e2c54be37d5eb4f6666e6aa59cd0581c7ffc3c"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/ed981911a7c90a604f4a2bee908ab07e3b786aca"
    }
  ],
  "schema_version": "1.4.0",
  "severity": []
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…