In the Linux kernel, the following vulnerability has been resolved:
mm/damon/reclaim: fix potential memory leak in damonreclaiminit()
damonreclaiminit() allocates a memory chunk for ctx with damonnewctx(). When damonselectops() fails, ctx is not released, which will lead to a memory leak.
We should release the ctx with damondestroyctx() when damonselectops() fails to fix the memory leak.
{ "vanir_signatures": [ { "digest": { "length": 489.0, "function_hash": "141240103787027292881128547507105990266" }, "target": { "function": "damon_reclaim_init", "file": "mm/damon/reclaim.c" }, "id": "CVE-2022-50088-1065ada3", "signature_type": "Function", "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@700aa4e11a3c4d2a44d06758db431a013d9e1b61", "signature_version": "v1" }, { "digest": { "length": 489.0, "function_hash": "141240103787027292881128547507105990266" }, "target": { "function": "damon_reclaim_init", "file": "mm/damon/reclaim.c" }, "id": "CVE-2022-50088-1ff2dc49", "signature_type": "Function", "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@188043c7f4f2bd662f2a55957d684fffa543e600", "signature_version": "v1" }, { "digest": { "line_hashes": [ "258401007391021944589230059167621319753", "333868053013094252710365077147099200076", "216427356369035920116067443717333252383", "181970411697081743805982077017255034212", "122109381572723384069873977927271438553" ], "threshold": 0.9 }, "target": { "file": "mm/damon/reclaim.c" }, "id": "CVE-2022-50088-561d6f23", "signature_type": "Line", "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@700aa4e11a3c4d2a44d06758db431a013d9e1b61", "signature_version": "v1" }, { "digest": { "line_hashes": [ "258401007391021944589230059167621319753", "333868053013094252710365077147099200076", "46345870959605970312964323860093181008", "66793279562090567174252576868288552990", "251171889880135502806912891124233315768" ], "threshold": 0.9 }, "target": { "file": "mm/damon/reclaim.c" }, "id": "CVE-2022-50088-5ff05930", "signature_type": "Line", "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9d3e9e1e0856f4c905bbb870f16f42ae72477071", "signature_version": "v1" }, { "digest": { "length": 380.0, "function_hash": "335171406044245395818006587007099972153" }, "target": { "function": "damon_reclaim_init", "file": "mm/damon/reclaim.c" }, "id": "CVE-2022-50088-77f8da02", "signature_type": "Function", "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9d3e9e1e0856f4c905bbb870f16f42ae72477071", "signature_version": "v1" }, { "digest": { "line_hashes": [ "258401007391021944589230059167621319753", "333868053013094252710365077147099200076", "216427356369035920116067443717333252383", "181970411697081743805982077017255034212", "122109381572723384069873977927271438553" ], "threshold": 0.9 }, "target": { "file": "mm/damon/reclaim.c" }, "id": "CVE-2022-50088-e7c5280c", "signature_type": "Line", "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@188043c7f4f2bd662f2a55957d684fffa543e600", "signature_version": "v1" } ] }