CVE-2022-49408

Source
https://cve.org/CVERecord?id=CVE-2022-49408
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49408.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49408
Downstream
Published
2025-02-26T02:12:32.048Z
Modified
2026-03-20T12:24:30.597050Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
ext4: fix memory leak in parse_apply_sb_mount_options()
Details

In the Linux kernel, the following vulnerability has been resolved:

ext4: fix memory leak in parseapplysbmountoptions()

If processing the on-disk mount options fails after any memory was allocated in the ext4fscontext, e.g. sqfnames, then this memory is leaked. Fix this by calling ext4fcfree() instead of kfree() directly.

Reproducer:

mkfs.ext4 -F /dev/vdc
tune2fs /dev/vdc -E mount_opts=usrjquota=file
echo clear > /sys/kernel/debug/kmemleak
mount /dev/vdc /vdc
echo scan > /sys/kernel/debug/kmemleak
sleep 5
echo scan > /sys/kernel/debug/kmemleak
cat /sys/kernel/debug/kmemleak
Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49408.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
7edfd85b1ffd36593011dec96ab395912a340418
Fixed
9ea3e6168948189cec31d0678d2b55b395f88491
Fixed
f92ded66e9d0aa20b883a2a5183973abc8f41815
Fixed
c069db76ed7b681c69159f44be96d2137e9ca989

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49408.json"