CVE-2022-49913
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
01/05/2025
Last modified:
12/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
btrfs: fix inode list leak during backref walking at find_parent_nodes()<br />
<br />
During backref walking, at find_parent_nodes(), if we are dealing with a<br />
data extent and we get an error while resolving the indirect backrefs, at<br />
resolve_indirect_refs(), or in the while loop that iterates over the refs<br />
in the direct refs rbtree, we end up leaking the inode lists attached to<br />
the direct refs we have in the direct refs rbtree that were not yet added<br />
to the refs ulist passed as argument to find_parent_nodes(). Since they<br />
were not yet added to the refs ulist and prelim_release() does not free<br />
the lists, on error the caller can only free the lists attached to the<br />
refs that were added to the refs ulist, all the remaining refs get their<br />
inode lists never freed, therefore leaking their memory.<br />
<br />
Fix this by having prelim_release() always free any attached inode list<br />
to each ref found in the rbtree, and have find_parent_nodes() set the<br />
ref&#39;s inode list to NULL once it transfers ownership of the inode list<br />
to a ref added to the refs ulist passed to find_parent_nodes().
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.14 (including) | 5.4.224 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.154 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.78 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.0.8 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/222a3d533027b9492d5b7f5ecdc01a90f57bb5a9
- https://git.kernel.org/stable/c/61e06128113711df0534c404fb6bb528eb7d2332
- https://git.kernel.org/stable/c/6a6731a0df8c47ecc703bd7bb73459df767051e0
- https://git.kernel.org/stable/c/83ea8c5b54d452a5769e605e3c5c687e8ca06d89
- https://git.kernel.org/stable/c/92876eec382a0f19f33d09d2c939e9ca49038ae5



