{
  "threat_severity" : "Low",
  "public_date" : "2025-09-16T00:00:00Z",
  "bugzilla" : {
    "description" : "kernel: floppy: Fix memory leak in do_floppy_init()",
    "id" : "2395876",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2395876"
  },
  "cvss3" : {
    "cvss3_base_score" : "5.5",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
    "status" : "verified"
  },
  "cwe" : "CWE-772",
  "details" : [ "In the Linux kernel, the following vulnerability has been resolved:\nfloppy: Fix memory leak in do_floppy_init()\nA memory leak was reported when floppy_alloc_disk() failed in\ndo_floppy_init().\nunreferenced object 0xffff888115ed25a0 (size 8):\ncomm \"modprobe\", pid 727, jiffies 4295051278 (age 25.529s)\nhex dump (first 8 bytes):\n00 ac 67 5b 81 88 ff ff                          ..g[....\nbacktrace:\n[<000000007f457abb>] __kmalloc_node+0x4c/0xc0\n[<00000000a87bfa9e>] blk_mq_realloc_tag_set_tags.part.0+0x6f/0x180\n[<000000006f02e8b1>] blk_mq_alloc_tag_set+0x573/0x1130\n[<0000000066007fd7>] 0xffffffffc06b8b08\n[<0000000081f5ac40>] do_one_initcall+0xd0/0x4f0\n[<00000000e26d04ee>] do_init_module+0x1a4/0x680\n[<000000001bb22407>] load_module+0x6249/0x7110\n[<00000000ad31ac4d>] __do_sys_finit_module+0x140/0x200\n[<000000007bddca46>] do_syscall_64+0x35/0x80\n[<00000000b5afec39>] entry_SYSCALL_64_after_hwframe+0x46/0xb0\nunreferenced object 0xffff88810fc30540 (size 32):\ncomm \"modprobe\", pid 727, jiffies 4295051278 (age 25.529s)\nhex dump (first 32 bytes):\n00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................\n00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................\nbacktrace:\n[<000000007f457abb>] __kmalloc_node+0x4c/0xc0\n[<000000006b91eab4>] blk_mq_alloc_tag_set+0x393/0x1130\n[<0000000066007fd7>] 0xffffffffc06b8b08\n[<0000000081f5ac40>] do_one_initcall+0xd0/0x4f0\n[<00000000e26d04ee>] do_init_module+0x1a4/0x680\n[<000000001bb22407>] load_module+0x6249/0x7110\n[<00000000ad31ac4d>] __do_sys_finit_module+0x140/0x200\n[<000000007bddca46>] do_syscall_64+0x35/0x80\n[<00000000b5afec39>] entry_SYSCALL_64_after_hwframe+0x46/0xb0\nIf the floppy_alloc_disk() failed, disks of current drive will not be set,\nthus the lastest allocated set->tag cannot be freed in the error handling\npath. A simple call graph shown as below:\nfloppy_module_init()\nfloppy_init()\ndo_floppy_init()\nfor (drive = 0; drive < N_DRIVE; drive++)\nblk_mq_alloc_tag_set()\nblk_mq_alloc_tag_set_tags()\nblk_mq_realloc_tag_set_tags() # set->tag allocated\nfloppy_alloc_disk()\nblk_mq_alloc_disk() # error occurred, disks failed to allocated\n->out_put_disk:\nfor (drive = 0; drive < N_DRIVE; drive++)\nif (!disks[drive][0]) # the last disks is not set and loop break\nbreak;\nblk_mq_free_tag_set() # the latest allocated set->tag leaked\nFix this problem by free the set->tag of current drive before jump to\nerror handling path.\n[efremov: added stable list, changed title]" ],
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2023-11-07T00:00:00Z",
    "advisory" : "RHSA-2023:6583",
    "cpe" : "cpe:/a:redhat:enterprise_linux:9",
    "package" : "kernel-0:5.14.0-362.8.1.el9_3"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2023-11-07T00:00:00Z",
    "advisory" : "RHSA-2023:6583",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9",
    "package" : "kernel-0:5.14.0-362.8.1.el9_3"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 10",
    "fix_state" : "Not affected",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:10"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Out of support scope",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Not affected",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Not affected",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Not affected",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Not affected",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "fix_state" : "Fix deferred",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2022-50342\nhttps://nvd.nist.gov/vuln/detail/CVE-2022-50342\nhttps://lore.kernel.org/linux-cve-announce/2025091639-CVE-2022-50342-d7ef@gregkh/T" ],
  "name" : "CVE-2022-50342",
  "csaw" : false
}