CVE-2022-50770

Source
https://cve.org/CVERecord?id=CVE-2022-50770
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50770.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-50770
Downstream
Related
Published
2025-12-24T13:05:59.700Z
Modified
2026-04-02T08:28:45.227062Z
Summary
ocfs2: fix memory leak in ocfs2_mount_volume()
Details

In the Linux kernel, the following vulnerability has been resolved:

ocfs2: fix memory leak in ocfs2mountvolume()

There is a memory leak reported by kmemleak:

unreferenced object 0xffff88810cc65e60 (size 32): comm "mount.ocfs2", pid 23753, jiffies 4302528942 (age 34735.105s) hex dump (first 32 bytes): 10 00 00 00 00 00 00 00 00 01 01 01 01 01 01 01 ................ 01 01 01 01 01 01 01 01 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff8170f73d>] __kmalloc+0x4d/0x150 [<ffffffffa0ac3f51>] ocfs2computereplayslots+0x121/0x330 [ocfs2] [<ffffffffa0b65165>] ocfs2checkvolume+0x485/0x900 [ocfs2] [<ffffffffa0b68129>] ocfs2mountvolume.isra.0+0x1e9/0x650 [ocfs2] [<ffffffffa0b7160b>] ocfs2fillsuper+0xe0b/0x1740 [ocfs2] [<ffffffff818e1fe2>] mountbdev+0x312/0x400 [<ffffffff819a086d>] legacygettree+0xed/0x1d0 [<ffffffff818de82d>] vfsgettree+0x7d/0x230 [<ffffffff81957f92>] pathmount+0xd62/0x1760 [<ffffffff81958a5a>] domount+0xca/0xe0 [<ffffffff81958d3c>] __x64sysmount+0x12c/0x1a0 [<ffffffff82f26f15>] dosyscall64+0x35/0x80 [<ffffffff8300006a>] entrySYSCALL64afterhwframe+0x46/0xb0

This call stack is related to two problems. Firstly, the ocfs2 super uses "replaymap" to trace online/offline slots, in order to recover offline slots during recovery and mount. But when ocfs2truncateloginit() returns an error in ocfs2mountvolume(), the memory of "replaymap" will not be freed in error handling path. Secondly, the memory of "replaymap" will not be freed if dmakeroot() returns an error in ocfs2fillsuper(). But the memory of "replaymap" will be freed normally when completing recovery and mount in ocfs2completemountrecovery().

Fix the first problem by adding error handling path to free "replaymap" when ocfs2truncateloginit() fails. And fix the second problem by calling ocfs2freereplayslots(osb) in the error handling path "outdismount". In addition, since ocfs2freereplay_slots() is static, it is necessary to remove its static attribute and declare it in header file.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50770.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
9140db04ef185f934acf2b1b15b3dd5e6a6bfc22
Fixed
7ef516888c4d30ae41bfcd79e7077d86d92794c5
Fixed
2b7e59ed2e77136e9360274f8f0fc208a003e95c
Fixed
8059e200259e9c483d715fc2df6340c227c3e196
Fixed
4efe1d2db731bad19891e2fb9b338724b1f598cc
Fixed
50ab0ca3aff4da26037113d69f5a756d8c1a92cd
Fixed
ce2fcf1516d674a174d9b34d1e1024d64de9fba3

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50770.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
2.6.30
Fixed
5.4.229
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.163
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.107
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.0.16
Type
ECOSYSTEM
Events
Introduced
6.1.0
Fixed
6.1.2

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50770.json"