{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2022-50451","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2025-09-17T14:53:07.011Z","datePublished":"2025-10-01T11:45:24.652Z","dateUpdated":"2026-05-11T19:19:43.723Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T19:19:43.723Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nfs/ntfs3: Fix memory leak on ntfs_fill_super() error path\n\nsyzbot reported kmemleak as below:\n\nBUG: memory leak\nunreferenced object 0xffff8880122f1540 (size 32):\n  comm \"a.out\", pid 6664, jiffies 4294939771 (age 25.500s)\n  hex dump (first 32 bytes):\n    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................\n    00 00 00 00 00 00 00 00 ed ff ed ff 00 00 00 00  ................\n  backtrace:\n    [<ffffffff81b16052>] ntfs_init_fs_context+0x22/0x1c0\n    [<ffffffff8164aaa7>] alloc_fs_context+0x217/0x430\n    [<ffffffff81626dd4>] path_mount+0x704/0x1080\n    [<ffffffff81627e7c>] __x64_sys_mount+0x18c/0x1d0\n    [<ffffffff84593e14>] do_syscall_64+0x34/0xb0\n    [<ffffffff84600087>] entry_SYSCALL_64_after_hwframe+0x63/0xcd\n\nThis patch fixes this issue by freeing mount options on error path of\nntfs_fill_super()."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["fs/ntfs3/super.c"],"versions":[{"version":"4534a70b7056fd4b9a1c6db5a4ce3c98546b291e","lessThan":"2dd9ccfb06bcdad30ad92d96c3affa38a458679e","status":"affected","versionType":"git"},{"version":"4534a70b7056fd4b9a1c6db5a4ce3c98546b291e","lessThan":"ff0df7d9cdbb12878155168b5234e99029e5377f","status":"affected","versionType":"git"},{"version":"4534a70b7056fd4b9a1c6db5a4ce3c98546b291e","lessThan":"2600c80ea7b39f987c3fa89287e73d62e322bbbd","status":"affected","versionType":"git"},{"version":"4534a70b7056fd4b9a1c6db5a4ce3c98546b291e","lessThan":"51e76a232f8c037f1d9e9922edc25b003d5f3414","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["fs/ntfs3/super.c"],"versions":[{"version":"5.15","status":"affected"},{"version":"0","lessThan":"5.15","status":"unaffected","versionType":"semver"},{"version":"5.15.87","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.0.17","lessThanOrEqual":"6.0.*","status":"unaffected","versionType":"semver"},{"version":"6.1.3","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.2","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.15","versionEndExcluding":"5.15.87"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.15","versionEndExcluding":"6.0.17"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.15","versionEndExcluding":"6.1.3"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.15","versionEndExcluding":"6.2"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/2dd9ccfb06bcdad30ad92d96c3affa38a458679e"},{"url":"https://git.kernel.org/stable/c/ff0df7d9cdbb12878155168b5234e99029e5377f"},{"url":"https://git.kernel.org/stable/c/2600c80ea7b39f987c3fa89287e73d62e322bbbd"},{"url":"https://git.kernel.org/stable/c/51e76a232f8c037f1d9e9922edc25b003d5f3414"}],"title":"fs/ntfs3: Fix memory leak on ntfs_fill_super() error path","x_generator":{"engine":"bippy-1.2.0"}}}}