PT-2025-8204 · Linux +2 · Linux Kernel +2
Baokun Li
+1
·
Published
2025-02-26
·
Updated
2025-04-14
·
CVE-2022-49276
5.5
Medium
Base vector | Vector | AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
Name of the Vulnerable Software and Affected Versions:
Linux kernel (affected versions not specified)
Description:
A memory leak issue has been identified in the jffs2 file system. The leak occurs when an error is returned in `jffs2 scan eraseblock()` and some memory has been added to the `jffs2 summary *s`. This can lead to memory leaks, as observed in the kmemleak report. The issue is caused by the failure to release the memory added in `s` when an error occurs. To fix this, `jffs2 sum reset collected(s)` should be called on exit to release the memory. Additionally, a new tag "out buf" is added to prevent NULL pointer references.
Recommendations:
To resolve the issue, call `jffs2 sum reset collected(s)` on exit to release the memory added in `s`.
As a temporary workaround, consider disabling the `jffs2 scan medium()` function until a patch is available.
Restrict access to the `jffs2` file system to minimize the risk of exploitation.
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
Memory Leak
Weakness Enumeration
Related Identifiers
Affected Products
References · 1331
- https://git.kernel.org/stable/c/51dbb5e36d59f62e34d462b801c1068248149cfe · Patch
- https://git.kernel.org/stable/c/b36bccb04e14cc0c1e2d0e92d477fe220314fad6 · Patch
- https://git.kernel.org/stable/c/9cdd3128874f5fe759e2c4e1360ab7fb96a8d1df · Patch
- https://git.kernel.org/stable/c/e711913463af916d777a4873068f415f1fe2ad33 · Patch
- https://osv.dev/vulnerability/UBUNTU-CVE-2022-49276 · Vendor Advisory
- https://cve.org/CVERecord?id=CVE-2022-49276 · Security Note
- https://ubuntu.com/security/CVE-2022-49276 · Vendor Advisory
- https://osv.dev/vulnerability/SUSE-SU-2025:1183-1 · Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2022-49276 · Security Note
- https://osv.dev/vulnerability/SUSE-SU-2025:1027-1 · Vendor Advisory
- https://osv.dev/vulnerability/CVE-2022-49276 · Vendor Advisory
- https://git.kernel.org/stable/c/82462324bf35b6b553400af1c1aa265069cee28f · Patch
- https://git.kernel.org/stable/c/455f4a23490bfcbedc8e5c245c463a59b19e5ddd · Patch
- https://git.kernel.org/stable/c/b26bbc0c122cad038831f226a4cb4de702225e16 · Patch
- https://osv.dev/vulnerability/SUSE-SU-2025:1176-1 · Vendor Advisory