{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2022-49927","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2025-05-01T14:05:17.253Z","datePublished":"2025-05-01T14:11:05.404Z","dateUpdated":"2026-05-11T19:09:24.289Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T19:09:24.289Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nnfs4: Fix kmemleak when allocate slot failed\n\nIf one of the slot allocate failed, should cleanup all the other\nallocated slots, otherwise, the allocated slots will leak:\n\n  unreferenced object 0xffff8881115aa100 (size 64):\n    comm \"\"mount.nfs\"\", pid 679, jiffies 4294744957 (age 115.037s)\n    hex dump (first 32 bytes):\n      00 cc 19 73 81 88 ff ff 00 a0 5a 11 81 88 ff ff  ...s......Z.....\n      00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................\n    backtrace:\n      [<000000007a4c434a>] nfs4_find_or_create_slot+0x8e/0x130\n      [<000000005472a39c>] nfs4_realloc_slot_table+0x23f/0x270\n      [<00000000cd8ca0eb>] nfs40_init_client+0x4a/0x90\n      [<00000000128486db>] nfs4_init_client+0xce/0x270\n      [<000000008d2cacad>] nfs4_set_client+0x1a2/0x2b0\n      [<000000000e593b52>] nfs4_create_server+0x300/0x5f0\n      [<00000000e4425dd2>] nfs4_try_get_tree+0x65/0x110\n      [<00000000d3a6176f>] vfs_get_tree+0x41/0xf0\n      [<0000000016b5ad4c>] path_mount+0x9b3/0xdd0\n      [<00000000494cae71>] __x64_sys_mount+0x190/0x1d0\n      [<000000005d56bdec>] do_syscall_64+0x35/0x80\n      [<00000000687c9ae4>] entry_SYSCALL_64_after_hwframe+0x46/0xb0"}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["fs/nfs/nfs4client.c"],"versions":[{"version":"abf79bb341bf52f75f295b850abdf5f78f584311","lessThan":"84b5cb476903003ae9ca88f32b57ff0eaefa6d4c","status":"affected","versionType":"git"},{"version":"abf79bb341bf52f75f295b850abdf5f78f584311","lessThan":"aae35a0c8a775fa4afa6a4e7dab3f936f1f89bbb","status":"affected","versionType":"git"},{"version":"abf79bb341bf52f75f295b850abdf5f78f584311","lessThan":"86ce0e93cf6fb4d0c447323ac66577c642628b9d","status":"affected","versionType":"git"},{"version":"abf79bb341bf52f75f295b850abdf5f78f584311","lessThan":"925cb538bd5851154602818dc80bf4b4d924c127","status":"affected","versionType":"git"},{"version":"abf79bb341bf52f75f295b850abdf5f78f584311","lessThan":"45aea4fbf61e205649c29200726b9f45c1718a67","status":"affected","versionType":"git"},{"version":"abf79bb341bf52f75f295b850abdf5f78f584311","lessThan":"24641993a7dce6b1628645f4e1d97ca06c9f765d","status":"affected","versionType":"git"},{"version":"abf79bb341bf52f75f295b850abdf5f78f584311","lessThan":"db333ae981fb8843c383aa7dbf62cc682597d401","status":"affected","versionType":"git"},{"version":"abf79bb341bf52f75f295b850abdf5f78f584311","lessThan":"7e8436728e22181c3f12a5dbabd35ed3a8b8c593","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["fs/nfs/nfs4client.c"],"versions":[{"version":"3.12","status":"affected"},{"version":"0","lessThan":"3.12","status":"unaffected","versionType":"semver"},{"version":"4.9.333","lessThanOrEqual":"4.9.*","status":"unaffected","versionType":"semver"},{"version":"4.14.299","lessThanOrEqual":"4.14.*","status":"unaffected","versionType":"semver"},{"version":"4.19.265","lessThanOrEqual":"4.19.*","status":"unaffected","versionType":"semver"},{"version":"5.4.224","lessThanOrEqual":"5.4.*","status":"unaffected","versionType":"semver"},{"version":"5.10.154","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.78","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.0.8","lessThanOrEqual":"6.0.*","status":"unaffected","versionType":"semver"},{"version":"6.1","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.12","versionEndExcluding":"4.9.333"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.12","versionEndExcluding":"4.14.299"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.12","versionEndExcluding":"4.19.265"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.12","versionEndExcluding":"5.4.224"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.12","versionEndExcluding":"5.10.154"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.12","versionEndExcluding":"5.15.78"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.12","versionEndExcluding":"6.0.8"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.12","versionEndExcluding":"6.1"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/84b5cb476903003ae9ca88f32b57ff0eaefa6d4c"},{"url":"https://git.kernel.org/stable/c/aae35a0c8a775fa4afa6a4e7dab3f936f1f89bbb"},{"url":"https://git.kernel.org/stable/c/86ce0e93cf6fb4d0c447323ac66577c642628b9d"},{"url":"https://git.kernel.org/stable/c/925cb538bd5851154602818dc80bf4b4d924c127"},{"url":"https://git.kernel.org/stable/c/45aea4fbf61e205649c29200726b9f45c1718a67"},{"url":"https://git.kernel.org/stable/c/24641993a7dce6b1628645f4e1d97ca06c9f765d"},{"url":"https://git.kernel.org/stable/c/db333ae981fb8843c383aa7dbf62cc682597d401"},{"url":"https://git.kernel.org/stable/c/7e8436728e22181c3f12a5dbabd35ed3a8b8c593"}],"title":"nfs4: Fix kmemleak when allocate slot failed","x_generator":{"engine":"bippy-1.2.0"}},"adp":[{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-401","lang":"en","description":"CWE-401 Missing Release of Memory after Effective Lifetime"}]}],"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":5.5,"attackVector":"LOCAL","baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","integrityImpact":"NONE","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"LOW","confidentialityImpact":"NONE"}},{"other":{"type":"ssvc","content":{"timestamp":"2025-10-01T14:56:42.974569Z","id":"CVE-2022-49927","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-10-01T14:56:45.495Z"}}]}}