-

CVE-2022-50289

In the Linux kernel, the following vulnerability has been resolved:

ocfs2: fix memory leak in ocfs2_stack_glue_init()

ocfs2_table_header should be free in ocfs2_stack_glue_init() if
ocfs2_sysfs_init() failed, otherwise kmemleak will report memleak.

BUG: memory leak
unreferenced object 0xffff88810eeb5800 (size 128):
  comm "modprobe", pid 4507, jiffies 4296182506 (age 55.888s)
  hex dump (first 32 bytes):
    c0 40 14 a0 ff ff ff ff 00 00 00 00 01 00 00 00  .@..............
    01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<000000001e59e1cd>] __register_sysctl_table+0xca/0xef0
    [<00000000c04f70f7>] 0xffffffffa0050037
    [<000000001bd12912>] do_one_initcall+0xdb/0x480
    [<0000000064f766c9>] do_init_module+0x1cf/0x680
    [<000000002ba52db0>] load_module+0x6441/0x6f20
    [<000000009772580d>] __do_sys_finit_module+0x12f/0x1c0
    [<00000000380c1f22>] do_syscall_64+0x3f/0x90
    [<000000004cf473bc>] entry_SYSCALL_64_after_hwframe+0x63/0xcd

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < 0000281f019111526f7abccc61f2746d2eb626ca
Version 3878f110f71a0971ff7acc15dd6db711b6ef37c6
Status affected
Version < 802abe2bc654e87334e6a0ab6c1adc2b6d5f6394
Version 3878f110f71a0971ff7acc15dd6db711b6ef37c6
Status affected
Version < b0822faebd79971617abd495beb2d6f5356b88bf
Version 3878f110f71a0971ff7acc15dd6db711b6ef37c6
Status affected
Version < 7c8bf45cea9c8d6fb3e14d8cd5ae60e0372f39b7
Version 3878f110f71a0971ff7acc15dd6db711b6ef37c6
Status affected
Version < f5f2682d3a34dd8350bf63f232d885fd95f25b92
Version 3878f110f71a0971ff7acc15dd6db711b6ef37c6
Status affected
Version < 61d68cf2ba79128c48d4b3fa4d10c34dc18ba572
Version 3878f110f71a0971ff7acc15dd6db711b6ef37c6
Status affected
Version < 6f6c13776cbee4b6a515f4cd3b859f046be4f6f9
Version 3878f110f71a0971ff7acc15dd6db711b6ef37c6
Status affected
Version < 0b2128b70849f2728949babfc1c760096ef72f5d
Version 3878f110f71a0971ff7acc15dd6db711b6ef37c6
Status affected
Version < 13b6269dd022aaa69ca8d1df374ab327504121cf
Version 3878f110f71a0971ff7acc15dd6db711b6ef37c6
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 2.6.26
Status affected
Version < 2.6.26
Version 0
Status unaffected
Version <= 4.9.*
Version 4.9.337
Status unaffected
Version <= 4.14.*
Version 4.14.303
Status unaffected
Version <= 4.19.*
Version 4.19.270
Status unaffected
Version <= 5.4.*
Version 5.4.229
Status unaffected
Version <= 5.10.*
Version 5.10.163
Status unaffected
Version <= 5.15.*
Version 5.15.86
Status unaffected
Version <= 6.0.*
Version 6.0.16
Status unaffected
Version <= 6.1.*
Version 6.1.2
Status unaffected
Version <= *
Version 6.2
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.04% 0.126
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String