CVE-2022-49109

In the Linux kernel, the following vulnerability has been resolved: ceph: fix inode reference leakage in ceph_get_snapdir() The ceph_get_inode() will search for or insert a new inode into the hash for the given vino, and return a reference to it. If new is non-NULL, its reference is consumed. We should release the reference when in error handing cases.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.34:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.34:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.34:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.34:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.34:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.34:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.34:rc7:*:*:*:*:*:*

History

23 Sep 2025, 18:12

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ceph: se corrige la fuga de referencia de inodo en ceph_get_snapdir(). ceph_get_inode() buscará o insertará un nuevo inodo en el hash para el vino dado y devolverá una referencia a él. Si new no es NULL, se consume su referencia. Deberíamos liberar la referencia en casos de manejo de errores.
First Time Linux
Linux linux Kernel
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.34:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.34:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.34:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.34:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.34:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.34:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.34:rc6:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/322794d3355c33adcc4feace0045d85a8e4ed813 - () https://git.kernel.org/stable/c/322794d3355c33adcc4feace0045d85a8e4ed813 - Patch
References () https://git.kernel.org/stable/c/3ae7163598c611a8892698e0c056fe794e52b44b - () https://git.kernel.org/stable/c/3ae7163598c611a8892698e0c056fe794e52b44b - Patch
References () https://git.kernel.org/stable/c/9cd21981dedfb4fe9f344529e4be35727cb10940 - () https://git.kernel.org/stable/c/9cd21981dedfb4fe9f344529e4be35727cb10940 - Patch
References () https://git.kernel.org/stable/c/b2d9bb3f06abddefdfa740b0a604575b6797e1bf - () https://git.kernel.org/stable/c/b2d9bb3f06abddefdfa740b0a604575b6797e1bf - Patch
CWE NVD-CWE-Other
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5

26 Feb 2025, 07:00

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-26 07:00

Updated : 2025-09-23 18:12


NVD link : CVE-2022-49109

Mitre link : CVE-2022-49109

CVE.ORG link : CVE-2022-49109


JSON object : View

Products Affected

linux

  • linux_kernel