๐Ÿ” CVE Alert

CVE-2022-49927

MEDIUM 5.5

nfs4: Fix kmemleak when allocate slot failed

CVSS Score
5.5
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: nfs4: Fix kmemleak when allocate slot failed If one of the slot allocate failed, should cleanup all the other allocated slots, otherwise, the allocated slots will leak: unreferenced object 0xffff8881115aa100 (size 64): comm ""mount.nfs"", pid 679, jiffies 4294744957 (age 115.037s) hex dump (first 32 bytes): 00 cc 19 73 81 88 ff ff 00 a0 5a 11 81 88 ff ff ...s......Z..... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<000000007a4c434a>] nfs4_find_or_create_slot+0x8e/0x130 [<000000005472a39c>] nfs4_realloc_slot_table+0x23f/0x270 [<00000000cd8ca0eb>] nfs40_init_client+0x4a/0x90 [<00000000128486db>] nfs4_init_client+0xce/0x270 [<000000008d2cacad>] nfs4_set_client+0x1a2/0x2b0 [<000000000e593b52>] nfs4_create_server+0x300/0x5f0 [<00000000e4425dd2>] nfs4_try_get_tree+0x65/0x110 [<00000000d3a6176f>] vfs_get_tree+0x41/0xf0 [<0000000016b5ad4c>] path_mount+0x9b3/0xdd0 [<00000000494cae71>] __x64_sys_mount+0x190/0x1d0 [<000000005d56bdec>] do_syscall_64+0x35/0x80 [<00000000687c9ae4>] entry_SYSCALL_64_after_hwframe+0x46/0xb0

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published May 1, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new medium vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
abf79bb341bf52f75f295b850abdf5f78f584311 < 84b5cb476903003ae9ca88f32b57ff0eaefa6d4c abf79bb341bf52f75f295b850abdf5f78f584311 < aae35a0c8a775fa4afa6a4e7dab3f936f1f89bbb abf79bb341bf52f75f295b850abdf5f78f584311 < 86ce0e93cf6fb4d0c447323ac66577c642628b9d abf79bb341bf52f75f295b850abdf5f78f584311 < 925cb538bd5851154602818dc80bf4b4d924c127 abf79bb341bf52f75f295b850abdf5f78f584311 < 45aea4fbf61e205649c29200726b9f45c1718a67 abf79bb341bf52f75f295b850abdf5f78f584311 < 24641993a7dce6b1628645f4e1d97ca06c9f765d abf79bb341bf52f75f295b850abdf5f78f584311 < db333ae981fb8843c383aa7dbf62cc682597d401 abf79bb341bf52f75f295b850abdf5f78f584311 < 7e8436728e22181c3f12a5dbabd35ed3a8b8c593
Linux / Linux
3.12

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/84b5cb476903003ae9ca88f32b57ff0eaefa6d4c git.kernel.org: https://git.kernel.org/stable/c/aae35a0c8a775fa4afa6a4e7dab3f936f1f89bbb git.kernel.org: https://git.kernel.org/stable/c/86ce0e93cf6fb4d0c447323ac66577c642628b9d git.kernel.org: https://git.kernel.org/stable/c/925cb538bd5851154602818dc80bf4b4d924c127 git.kernel.org: https://git.kernel.org/stable/c/45aea4fbf61e205649c29200726b9f45c1718a67 git.kernel.org: https://git.kernel.org/stable/c/24641993a7dce6b1628645f4e1d97ca06c9f765d git.kernel.org: https://git.kernel.org/stable/c/db333ae981fb8843c383aa7dbf62cc682597d401 git.kernel.org: https://git.kernel.org/stable/c/7e8436728e22181c3f12a5dbabd35ed3a8b8c593