First published: Thu May 01 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: fscrypt: fix keyring memory leak on mount failure Commit d7e7b9af104c ("fscrypt: stop using keyrings subsystem for fscrypt_master_key") moved the keyring destruction from __put_super() to generic_shutdown_super() so that the filesystem's block device(s) are still available. Unfortunately, this causes a memory leak in the case where a mount is attempted with the test_dummy_encryption mount option, but the mount fails after the option has already been processed. To fix this, attempt the keyring destruction in both places.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-49897 has a low severity rating due to the nature of the memory leak affecting keyring destruction during mount failures.
To fix CVE-2022-49897, update your Linux kernel to the latest version where this vulnerability has been addressed.
The potential impacts of CVE-2022-49897 include memory leaks that could lead to increased memory usage in the system.
CVE-2022-49897 affects various versions of the Linux kernel prior to the fix being implemented in the latest releases.
There is currently no known public exploit for CVE-2022-49897, but it is important to address the vulnerability to maintain system integrity.