CVE-2022-49366

In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix reference count leak in smb_check_perm_dacl() The issue happens in a specific path in smb_check_perm_dacl(). When "id" and "uid" have the same value, the function simply jumps out of the loop without decrementing the reference count of the object "posix_acls", which is increased by get_acl() earlier. This may result in memory leaks. Fix it by decreasing the reference count of "posix_acls" before jumping to label "check_access_bits".
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

14 Apr 2025, 20:42

Type Values Removed Values Added
CWE NVD-CWE-Other
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ksmbd: se corrige la pérdida de recuento de referencias en smb_check_perm_dacl() El problema ocurre en una ruta específica en smb_check_perm_dacl(). Cuando "id" y "uid" tienen el mismo valor, la función simplemente salta del bucle sin disminuir el recuento de referencias del objeto "posix_acls", que se incrementa mediante get_acl() anteriormente. Esto puede provocar fugas de memoria. Arréglelo disminuyendo el recuento de referencias de "posix_acls" antes de saltar a la etiqueta "check_access_bits".
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/248d71b440aef829f5cc5f6545ca113ef5062900 - () https://git.kernel.org/stable/c/248d71b440aef829f5cc5f6545ca113ef5062900 - Patch
References () https://git.kernel.org/stable/c/9758a6653c27867d810de02b4e5697163dda9883 - () https://git.kernel.org/stable/c/9758a6653c27867d810de02b4e5697163dda9883 - Patch
References () https://git.kernel.org/stable/c/cf824b95c12a1abacadbc2d069931963221a3414 - () https://git.kernel.org/stable/c/cf824b95c12a1abacadbc2d069931963221a3414 - Patch
References () https://git.kernel.org/stable/c/d21a580dafc69aa04f46e6099616146a536b0724 - () https://git.kernel.org/stable/c/d21a580dafc69aa04f46e6099616146a536b0724 - Patch
First Time Linux linux Kernel
Linux

26 Feb 2025, 07:01

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-26 07:01

Updated : 2025-04-14 20:42


NVD link : CVE-2022-49366

Mitre link : CVE-2022-49366

CVE.ORG link : CVE-2022-49366


JSON object : View

Products Affected

linux

  • linux_kernel