vulnerability
Ubuntu: (CVE-2022-49927): linux vulnerability
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
5 | (AV:L/AC:L/Au:S/C:N/I:N/A:C) | May 1, 2025 | May 6, 2025 | Jun 12, 2025 |
Description
In the Linux kernel, the following vulnerability has been resolved:
nfs4: Fix kmemleak when allocate slot failed
If one of the slot allocate failed, should cleanup all the other
allocated slots, otherwise, the allocated slots will leak:
unreferenced object 0xffff8881115aa100 (size 64):
comm ""mount.nfs"", pid 679, jiffies 4294744957 (age 115.037s)
hex dump (first 32 bytes):
00 cc 19 73 81 88 ff ff 00 a0 5a 11 81 88 ff ff ...s......Z.....
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[] nfs4_find_or_create_slot+0x8e/0x130
[] nfs4_realloc_slot_table+0x23f/0x270
[] nfs40_init_client+0x4a/0x90
[] nfs4_init_client+0xce/0x270
[] nfs4_set_client+0x1a2/0x2b0
[] nfs4_create_server+0x300/0x5f0
[] nfs4_try_get_tree+0x65/0x110
[] vfs_get_tree+0x41/0xf0
[] path_mount+0x9b3/0xdd0
[] __x64_sys_mount+0x190/0x1d0
[] do_syscall_64+0x35/0x80
[] entry_SYSCALL_64_after_hwframe+0x46/0xb0
Solution(s)
References
- CVE-2022-49927
- https://attackerkb.com/topics/CVE-2022-49927
- URL-https://git.kernel.org/linus/7e8436728e22181c3f12a5dbabd35ed3a8b8c593
- URL-https://git.kernel.org/stable/c/24641993a7dce6b1628645f4e1d97ca06c9f765d
- URL-https://git.kernel.org/stable/c/45aea4fbf61e205649c29200726b9f45c1718a67
- URL-https://git.kernel.org/stable/c/7e8436728e22181c3f12a5dbabd35ed3a8b8c593
- URL-https://git.kernel.org/stable/c/84b5cb476903003ae9ca88f32b57ff0eaefa6d4c
- URL-https://git.kernel.org/stable/c/86ce0e93cf6fb4d0c447323ac66577c642628b9d
- URL-https://git.kernel.org/stable/c/925cb538bd5851154602818dc80bf4b4d924c127
- URL-https://git.kernel.org/stable/c/aae35a0c8a775fa4afa6a4e7dab3f936f1f89bbb
- URL-https://git.kernel.org/stable/c/db333ae981fb8843c383aa7dbf62cc682597d401
- URL-https://www.cve.org/CVERecord?id=CVE-2022-49927

Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.