CVE-2022-49109

Source
https://cve.org/CVERecord?id=CVE-2022-49109
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49109.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49109
Downstream
Related
Published
2025-02-26T01:54:55.508Z
Modified
2026-04-11T12:43:33.045005Z
Summary
ceph: fix inode reference leakage in ceph_get_snapdir()
Details

In the Linux kernel, the following vulnerability has been resolved:

ceph: fix inode reference leakage in cephgetsnapdir()

The cephgetinode() will search for or insert a new inode into the hash for the given vino, and return a reference to it. If new is non-NULL, its reference is consumed.

We should release the reference when in error handing cases.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49109.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
9030aaf9bf0a1eee47a154c316c789e959638b0f
Fixed
3ae7163598c611a8892698e0c056fe794e52b44b
Fixed
9cd21981dedfb4fe9f344529e4be35727cb10940
Fixed
b2d9bb3f06abddefdfa740b0a604575b6797e1bf
Fixed
322794d3355c33adcc4feace0045d85a8e4ed813

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49109.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
2.6.34
Fixed
5.15.34
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
5.16.20
Type
ECOSYSTEM
Events
Introduced
5.17.0
Fixed
5.17.3

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49109.json"