DEBIAN-CVE-2022-50770

Source
https://security-tracker.debian.org/tracker/CVE-2022-50770
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2022-50770.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2022-50770
Upstream
Published
2025-12-24T13:16:03.813Z
Modified
2025-12-25T11:17:11.974280Z
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved: ocfs2: fix memory leak in ocfs2mountvolume() There is a memory leak reported by kmemleak: unreferenced object 0xffff88810cc65e60 (size 32): comm "mount.ocfs2", pid 23753, jiffies 4302528942 (age 34735.105s) hex dump (first 32 bytes): 10 00 00 00 00 00 00 00 00 01 01 01 01 01 01 01 ................ 01 01 01 01 01 01 01 01 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff8170f73d>] _kmalloc+0x4d/0x150 [<ffffffffa0ac3f51>] ocfs2computereplayslots+0x121/0x330 [ocfs2] [<ffffffffa0b65165>] ocfs2checkvolume+0x485/0x900 [ocfs2] [<ffffffffa0b68129>] ocfs2mountvolume.isra.0+0x1e9/0x650 [ocfs2] [<ffffffffa0b7160b>] ocfs2fillsuper+0xe0b/0x1740 [ocfs2] [<ffffffff818e1fe2>] mountbdev+0x312/0x400 [<ffffffff819a086d>] legacygettree+0xed/0x1d0 [<ffffffff818de82d>] vfsgettree+0x7d/0x230 [<ffffffff81957f92>] pathmount+0xd62/0x1760 [<ffffffff81958a5a>] domount+0xca/0xe0 [<ffffffff81958d3c>] _x64sysmount+0x12c/0x1a0 [<ffffffff82f26f15>] dosyscall64+0x35/0x80 [<ffffffff8300006a>] entrySYSCALL64afterhwframe+0x46/0xb0 This call stack is related to two problems. Firstly, the ocfs2 super uses "replaymap" to trace online/offline slots, in order to recover offline slots during recovery and mount. But when ocfs2truncateloginit() returns an error in ocfs2mountvolume(), the memory of "replaymap" will not be freed in error handling path. Secondly, the memory of "replaymap" will not be freed if dmakeroot() returns an error in ocfs2fillsuper(). But the memory of "replaymap" will be freed normally when completing recovery and mount in ocfs2completemountrecovery(). Fix the first problem by adding error handling path to free "replaymap" when ocfs2truncateloginit() fails. And fix the second problem by calling ocfs2freereplayslots(osb) in the error handling path "outdismount". In addition, since ocfs2freereplay_slots() is static, it is necessary to remove its static attribute and declare it in header file.

References

Affected packages

Debian:11 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.10.178-1

Affected versions

5.*

5.10.46-4
5.10.46-5
5.10.70-1~bpo10+1
5.10.70-1
5.10.84-1
5.10.92-1~bpo10+1
5.10.92-1
5.10.92-2
5.10.103-1~bpo10+1
5.10.103-1
5.10.106-1
5.10.113-1
5.10.120-1~bpo10+1
5.10.120-1
5.10.127-1
5.10.127-2~bpo10+1
5.10.127-2
5.10.136-1
5.10.140-1
5.10.148-1
5.10.149-1
5.10.149-2
5.10.158-1
5.10.158-2
5.10.162-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source

"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2022-50770.json"

Debian:12 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.1.4-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source

"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2022-50770.json"

Debian:13 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.1.4-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source

"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2022-50770.json"

Debian:14 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.1.4-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source

"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2022-50770.json"