CVE-2022-50770
Description
In the Linux kernel, the following vulnerability has been resolved:
ocfs2: fix memory leak in ocfs2_mount_volume()
There is a memory leak reported by kmemleak:
unreferenced object 0xffff88810cc65e60 (size 32): comm "mount.ocfs2", pid 23753, jiffies 4302528942 (age 34735.105s) hex dump (first 32 bytes): 10 00 00 00 00 00 00 00 00 01 01 01 01 01 01 01 ................ 01 01 01 01 01 01 01 01 00 00 00 00 00 00 00 00 ................ backtrace: [] __kmalloc+0x4d/0x150 [] ocfs2_compute_replay_slots+0x121/0x330 [ocfs2] [] ocfs2_check_volume+0x485/0x900 [ocfs2] [] ocfs2_mount_volume.isra.0+0x1e9/0x650 [ocfs2] [] ocfs2_fill_super+0xe0b/0x1740 [ocfs2] [] mount_bdev+0x312/0x400 [] legacy_get_tree+0xed/0x1d0 [] vfs_get_tree+0x7d/0x230 [] path_mount+0xd62/0x1760 [] do_mount+0xca/0xe0 [] __x64_sys_mount+0x12c/0x1a0 [] do_syscall_64+0x35/0x80 [] entry_SYSCALL_64_after_hwframe+0x46/0xb0
This call stack is related to two problems. Firstly, the ocfs2 super uses "replay_map" to trace online/offline slots, in order to recover offline slots during recovery and mount. But when ocfs2_truncate_log_init() returns an error in ocfs2_mount_volume(), the memory of "replay_map" will not be freed in error handling path. Secondly, the memory of "replay_map" will not be freed if d_make_root() returns an error in ocfs2_fill_super(). But the memory of "replay_map" will be freed normally when completing recovery and mount in ocfs2_complete_mount_recovery().
Fix the first problem by adding error handling path to free "replay_map" when ocfs2_truncate_log_init() fails. And fix the second problem by calling ocfs2_free_replay_slots(osb) in the error handling path "out_dismount". In addition, since ocfs2_free_replay_slots() is static, it is necessary to remove its static attribute and declare it in header file.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A memory leak in the Linux kernel's ocfs2 filesystem occurs when mounting fails, leaving the 'replay_map' allocation unfreed, which can exhaust kernel memory.
Vulnerability
Description
CVE-2022-50770 is a memory leak vulnerability in the Linux kernel's Oracle Cluster File System 2 (ocfs2). The leak occurs in the ocfs2_mount_volume() function, where a replay_map structure allocated during ocfs2_compute_replay_slots() is not freed in certain error paths, as reported by kmemleak.
Root
Cause and Exploitability
The bug arises from two distinct scenarios during filesystem mount. First, if ocfs2_truncate_log_init() fails inside ocfs2_mount_volume(), the error handling code does not free the replay_map memory. Second, if d_make_root() fails in ocfs2_fill_super(), the replay_map also remains allocated. An attacker needs local access and the ability to trigger a mount operation of a specially crafted or corrupted ocfs2 filesystem to cause the leak. No authentication is required beyond standard filesystem mount capabilities.
Impact
Repeated mount attempts can persistently leak kernel memory, potentially leading to resource exhaustion and system instability. While the leak is low in severity per instance, it can accumulate over time, degrading system performance.
Mitigation
The issue is fixed in the Linux kernel by adding proper error handling to free the replay_map in the failure paths. Official patches are available in stable kernel commits [1], [2], and [3]. Users should update their kernel to one containing these fixes.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
67ef516888c4d2b7e59ed2e778059e200259e4efe1d2db73150ab0ca3aff4ce2fcf1516d6Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
6- git.kernel.org/stable/c/2b7e59ed2e77136e9360274f8f0fc208a003e95cnvd
- git.kernel.org/stable/c/4efe1d2db731bad19891e2fb9b338724b1f598ccnvd
- git.kernel.org/stable/c/50ab0ca3aff4da26037113d69f5a756d8c1a92cdnvd
- git.kernel.org/stable/c/7ef516888c4d30ae41bfcd79e7077d86d92794c5nvd
- git.kernel.org/stable/c/8059e200259e9c483d715fc2df6340c227c3e196nvd
- git.kernel.org/stable/c/ce2fcf1516d674a174d9b34d1e1024d64de9fba3nvd
News mentions
0No linked articles in our index yet.