VYPR
Unrated severityNVD Advisory· Published Dec 8, 2025· Updated Apr 15, 2026

CVE-2022-50622

CVE-2022-50622

Description

In the Linux kernel, the following vulnerability has been resolved:

ext4: fix potential memory leak in ext4_fc_record_modified_inode()

As krealloc may return NULL, in this case 'state->fc_modified_inodes' may not be freed by krealloc, but 'state->fc_modified_inodes' already set NULL. Then will lead to 'state->fc_modified_inodes' memory leak.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A potential memory leak in ext4's fast commit code when krealloc returns NULL, leading to loss of pointer to previously allocated memory.

Vulnerability

In the Linux kernel's ext4 filesystem, the function ext4_fc_record_modified_inode() uses krealloc to resize a buffer (state->fc_modified_inodes). However, if krealloc fails and returns NULL, the code incorrectly sets the pointer to NULL without freeing the original memory, causing a memory leak [1][2].

Exploitation

An attacker would need to trigger a krealloc failure, which could be achieved by exhausting memory or inducing a specific allocation pattern. The vulnerability is in the fast commit path, which is used during journal commits. A local attacker with the ability to mount and interact with an ext4 filesystem could potentially exploit this to cause a denial of service via memory exhaustion [1][2].

Impact

Successful exploitation leads to a memory leak, depleting system memory over time and potentially causing a denial of service. The leak is proportional to the number of inodes modified in a transaction, making it more severe under heavy filesystem activity [1][2].

Mitigation

The issue is fixed in Linux kernel versions 4.9.337, 5.4.228, 5.10.163, 5.15.87, 6.1.5, and 6.2 with commits referenced above [1][2]. Users should apply the latest stable kernel updates to remediate this vulnerability.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

5

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

5

News mentions

0

No linked articles in our index yet.