vulnerability
Ubuntu: (CVE-2022-50451): linux vulnerability
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:L/AC:L/Au:S/C:N/I:N/A:C) | Oct 1, 2025 | Oct 10, 2025 | Oct 24, 2025 |
Description
In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: Fix memory leak on ntfs_fill_super() error path syzbot reported kmemleak as below: BUG: memory leak unreferenced object 0xffff8880122f1540 (size 32): comm "a.out", pid 6664, jiffies 4294939771 (age 25.500s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 ed ff ed ff 00 00 00 00 ................ backtrace: [<ffffffff81b16052>] ntfs_init_fs_context+0x22/0x1c0 [<ffffffff8164aaa7>] alloc_fs_context+0x217/0x430 [<ffffffff81626dd4>] path_mount+0x704/0x1080 [<ffffffff81627e7c>] __x64_sys_mount+0x18c/0x1d0 [<ffffffff84593e14>] do_syscall_64+0x34/0xb0 [<ffffffff84600087>] entry_SYSCALL_64_after_hwframe+0x63/0xcd This patch fixes this issue by freeing mount options on error path of ntfs_fill_super().
Solutions
References
- CVE-2022-50451
- https://attackerkb.com/topics/CVE-2022-50451
- URL-https://git.kernel.org/linus/51e76a232f8c037f1d9e9922edc25b003d5f3414
- URL-https://git.kernel.org/stable/c/2600c80ea7b39f987c3fa89287e73d62e322bbbd
- URL-https://git.kernel.org/stable/c/2dd9ccfb06bcdad30ad92d96c3affa38a458679e
- URL-https://git.kernel.org/stable/c/51e76a232f8c037f1d9e9922edc25b003d5f3414
- URL-https://git.kernel.org/stable/c/ff0df7d9cdbb12878155168b5234e99029e5377f
- URL-https://www.cve.org/CVERecord?id=CVE-2022-50451
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.