CVE-2022-49927

In the Linux kernel, the following vulnerability has been resolved: nfs4: Fix kmemleak when allocate slot failed If one of the slot allocate failed, should cleanup all the other allocated slots, otherwise, the allocated slots will leak: unreferenced object 0xffff8881115aa100 (size 64): comm ""mount.nfs"", pid 679, jiffies 4294744957 (age 115.037s) hex dump (first 32 bytes): 00 cc 19 73 81 88 ff ff 00 a0 5a 11 81 88 ff ff ...s......Z..... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<000000007a4c434a>] nfs4_find_or_create_slot+0x8e/0x130 [<000000005472a39c>] nfs4_realloc_slot_table+0x23f/0x270 [<00000000cd8ca0eb>] nfs40_init_client+0x4a/0x90 [<00000000128486db>] nfs4_init_client+0xce/0x270 [<000000008d2cacad>] nfs4_set_client+0x1a2/0x2b0 [<000000000e593b52>] nfs4_create_server+0x300/0x5f0 [<00000000e4425dd2>] nfs4_try_get_tree+0x65/0x110 [<00000000d3a6176f>] vfs_get_tree+0x41/0xf0 [<0000000016b5ad4c>] path_mount+0x9b3/0xdd0 [<00000000494cae71>] __x64_sys_mount+0x190/0x1d0 [<000000005d56bdec>] do_syscall_64+0x35/0x80 [<00000000687c9ae4>] entry_SYSCALL_64_after_hwframe+0x46/0xb0
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*

History

07 May 2025, 13:28

Type Values Removed Values Added
First Time Linux linux Kernel
Linux
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE CWE-401
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/24641993a7dce6b1628645f4e1d97ca06c9f765d - () https://git.kernel.org/stable/c/24641993a7dce6b1628645f4e1d97ca06c9f765d - Patch
References () https://git.kernel.org/stable/c/45aea4fbf61e205649c29200726b9f45c1718a67 - () https://git.kernel.org/stable/c/45aea4fbf61e205649c29200726b9f45c1718a67 - Patch
References () https://git.kernel.org/stable/c/7e8436728e22181c3f12a5dbabd35ed3a8b8c593 - () https://git.kernel.org/stable/c/7e8436728e22181c3f12a5dbabd35ed3a8b8c593 - Patch
References () https://git.kernel.org/stable/c/84b5cb476903003ae9ca88f32b57ff0eaefa6d4c - () https://git.kernel.org/stable/c/84b5cb476903003ae9ca88f32b57ff0eaefa6d4c - Patch
References () https://git.kernel.org/stable/c/86ce0e93cf6fb4d0c447323ac66577c642628b9d - () https://git.kernel.org/stable/c/86ce0e93cf6fb4d0c447323ac66577c642628b9d - Patch
References () https://git.kernel.org/stable/c/925cb538bd5851154602818dc80bf4b4d924c127 - () https://git.kernel.org/stable/c/925cb538bd5851154602818dc80bf4b4d924c127 - Patch
References () https://git.kernel.org/stable/c/aae35a0c8a775fa4afa6a4e7dab3f936f1f89bbb - () https://git.kernel.org/stable/c/aae35a0c8a775fa4afa6a4e7dab3f936f1f89bbb - Patch
References () https://git.kernel.org/stable/c/db333ae981fb8843c383aa7dbf62cc682597d401 - () https://git.kernel.org/stable/c/db333ae981fb8843c383aa7dbf62cc682597d401 - Patch

02 May 2025, 13:52

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: nfs4: Se corrige kmemleak cuando falla la asignación de ranura Si falla la asignación de una ranura, se deben limpiar todas las demás ranuras asignadas, de lo contrario, las ranuras asignadas tendrán fugas: objeto sin referencia 0xffff8881115aa100 (tamaño 64): comm ""mount.nfs"", pid 679, jiffies 4294744957 (edad 115.037s) volcado hexadecimal (primeros 32 bytes): 00 cc 19 73 81 88 ff ff 00 a0 5a 11 81 88 ff ff ...s......Z..... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ seguimiento inverso:[&lt;000000007a4c434a&gt;] nfs4_find_or_create_slot+0x8e/0x130 [&lt;000000005472a39c&gt;] nfs4_realloc_slot_table+0x23f/0x270 [&lt;00000000cd8ca0eb&gt;] nfs40_init_client+0x4a/0x90 [&lt;00000000128486db&gt;] nfs4_init_client+0xce/0x270 [&lt;000000008d2cacad&gt;] nfs4_set_client+0x1a2/0x2b0 [&lt;000000000e593b52&gt;] nfs4_create_server+0x300/0x5f0 [&lt;00000000e4425dd2&gt;] nfs4_try_get_tree+0x65/0x110 [&lt;00000000d3a6176f&gt;] vfs_get_tree+0x41/0xf0 [&lt;0000000016b5ad4c&gt;] path_mount+0x9b3/0xdd0 [&lt;00000000494cae71&gt;] __x64_sys_mount+0x190/0x1d0 [&lt;000000005d56bdec&gt;] do_syscall_64+0x35/0x80 [&lt;00000000687c9ae4&gt;] entry_SYSCALL_64_after_hwframe+0x46/0xb0

01 May 2025, 15:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-01 15:16

Updated : 2025-05-07 13:28


NVD link : CVE-2022-49927

Mitre link : CVE-2022-49927

CVE.ORG link : CVE-2022-49927


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-401

Missing Release of Memory after Effective Lifetime