Логотип exploitDog
bind:CVE-2022-49897
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-49897

Количество 4

Количество 4

ubuntu логотип

CVE-2022-49897

9 месяцев назад

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

EPSS: Низкий
redhat логотип

CVE-2022-49897

9 месяцев назад

[REJECTED CVE] In the Linux kernel, the following vulnerability has been resolved: fscrypt: fix keyring memory leak on mount failure

CVSS3: 7
EPSS: Низкий
nvd логотип

CVE-2022-49897

9 месяцев назад

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

EPSS: Низкий
github логотип

GHSA-52fr-53gv-g23j

9 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: fscrypt: fix keyring memory leak on mount failure Commit d7e7b9af104c ("fscrypt: stop using keyrings subsystem for fscrypt_master_key") moved the keyring destruction from __put_super() to generic_shutdown_super() so that the filesystem's block device(s) are still available. Unfortunately, this causes a memory leak in the case where a mount is attempted with the test_dummy_encryption mount option, but the mount fails after the option has already been processed. To fix this, attempt the keyring destruction in both places.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2022-49897

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

9 месяцев назад
redhat логотип
CVE-2022-49897

[REJECTED CVE] In the Linux kernel, the following vulnerability has been resolved: fscrypt: fix keyring memory leak on mount failure

CVSS3: 7
9 месяцев назад
nvd логотип
CVE-2022-49897

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

9 месяцев назад
github логотип
GHSA-52fr-53gv-g23j

In the Linux kernel, the following vulnerability has been resolved: fscrypt: fix keyring memory leak on mount failure Commit d7e7b9af104c ("fscrypt: stop using keyrings subsystem for fscrypt_master_key") moved the keyring destruction from __put_super() to generic_shutdown_super() so that the filesystem's block device(s) are still available. Unfortunately, this causes a memory leak in the case where a mount is attempted with the test_dummy_encryption mount option, but the mount fails after the option has already been processed. To fix this, attempt the keyring destruction in both places.

9 месяцев назад

Уязвимостей на страницу