-

CVE-2022-50289

In the Linux kernel, the following vulnerability has been resolved:

ocfs2: fix memory leak in ocfs2_stack_glue_init()

ocfs2_table_header should be free in ocfs2_stack_glue_init() if
ocfs2_sysfs_init() failed, otherwise kmemleak will report memleak.

BUG: memory leak
unreferenced object 0xffff88810eeb5800 (size 128):
  comm "modprobe", pid 4507, jiffies 4296182506 (age 55.888s)
  hex dump (first 32 bytes):
    c0 40 14 a0 ff ff ff ff 00 00 00 00 01 00 00 00  .@..............
    01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<000000001e59e1cd>] __register_sysctl_table+0xca/0xef0
    [<00000000c04f70f7>] 0xffffffffa0050037
    [<000000001bd12912>] do_one_initcall+0xdb/0x480
    [<0000000064f766c9>] do_init_module+0x1cf/0x680
    [<000000002ba52db0>] load_module+0x6441/0x6f20
    [<000000009772580d>] __do_sys_finit_module+0x12f/0x1c0
    [<00000000380c1f22>] do_syscall_64+0x3f/0x90
    [<000000004cf473bc>] entry_SYSCALL_64_after_hwframe+0x63/0xcd

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < 0000281f019111526f7abccc61f2746d2eb626ca
Version 3878f110f71a0971ff7acc15dd6db711b6ef37c6
Status affected
Version < 802abe2bc654e87334e6a0ab6c1adc2b6d5f6394
Version 3878f110f71a0971ff7acc15dd6db711b6ef37c6
Status affected
Version < b0822faebd79971617abd495beb2d6f5356b88bf
Version 3878f110f71a0971ff7acc15dd6db711b6ef37c6
Status affected
Version < 7c8bf45cea9c8d6fb3e14d8cd5ae60e0372f39b7
Version 3878f110f71a0971ff7acc15dd6db711b6ef37c6
Status affected
Version < f5f2682d3a34dd8350bf63f232d885fd95f25b92
Version 3878f110f71a0971ff7acc15dd6db711b6ef37c6
Status affected
Version < 61d68cf2ba79128c48d4b3fa4d10c34dc18ba572
Version 3878f110f71a0971ff7acc15dd6db711b6ef37c6
Status affected
Version < 6f6c13776cbee4b6a515f4cd3b859f046be4f6f9
Version 3878f110f71a0971ff7acc15dd6db711b6ef37c6
Status affected
Version < 0b2128b70849f2728949babfc1c760096ef72f5d
Version 3878f110f71a0971ff7acc15dd6db711b6ef37c6
Status affected
Version < 13b6269dd022aaa69ca8d1df374ab327504121cf
Version 3878f110f71a0971ff7acc15dd6db711b6ef37c6
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 2.6.26
Status affected
Version < 2.6.26
Version 0
Status unaffected
Version <= 4.9.*
Version 4.9.337
Status unaffected
Version <= 4.14.*
Version 4.14.303
Status unaffected
Version <= 4.19.*
Version 4.19.270
Status unaffected
Version <= 5.4.*
Version 5.4.229
Status unaffected
Version <= 5.10.*
Version 5.10.163
Status unaffected
Version <= 5.15.*
Version 5.15.86
Status unaffected
Version <= 6.0.*
Version 6.0.16
Status unaffected
Version <= 6.1.*
Version 6.1.2
Status unaffected
Version <= *
Version 6.2
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.04% 0.126
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string