{"id":"CVE-2022-50451","summary":"fs/ntfs3: Fix memory leak on ntfs_fill_super() error path","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nfs/ntfs3: Fix memory leak on ntfs_fill_super() error path\n\nsyzbot reported kmemleak as below:\n\nBUG: memory leak\nunreferenced object 0xffff8880122f1540 (size 32):\n  comm \"a.out\", pid 6664, jiffies 4294939771 (age 25.500s)\n  hex dump (first 32 bytes):\n    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................\n    00 00 00 00 00 00 00 00 ed ff ed ff 00 00 00 00  ................\n  backtrace:\n    [\u003cffffffff81b16052\u003e] ntfs_init_fs_context+0x22/0x1c0\n    [\u003cffffffff8164aaa7\u003e] alloc_fs_context+0x217/0x430\n    [\u003cffffffff81626dd4\u003e] path_mount+0x704/0x1080\n    [\u003cffffffff81627e7c\u003e] __x64_sys_mount+0x18c/0x1d0\n    [\u003cffffffff84593e14\u003e] do_syscall_64+0x34/0xb0\n    [\u003cffffffff84600087\u003e] entry_SYSCALL_64_after_hwframe+0x63/0xcd\n\nThis patch fixes this issue by freeing mount options on error path of\nntfs_fill_super().","modified":"2026-04-02T08:28:30.941137Z","published":"2025-10-01T11:45:24.652Z","database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50451.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/2600c80ea7b39f987c3fa89287e73d62e322bbbd"},{"type":"WEB","url":"https://git.kernel.org/stable/c/2dd9ccfb06bcdad30ad92d96c3affa38a458679e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/51e76a232f8c037f1d9e9922edc25b003d5f3414"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ff0df7d9cdbb12878155168b5234e99029e5377f"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50451.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50451"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"4534a70b7056fd4b9a1c6db5a4ce3c98546b291e"},{"fixed":"2dd9ccfb06bcdad30ad92d96c3affa38a458679e"},{"fixed":"ff0df7d9cdbb12878155168b5234e99029e5377f"},{"fixed":"2600c80ea7b39f987c3fa89287e73d62e322bbbd"},{"fixed":"51e76a232f8c037f1d9e9922edc25b003d5f3414"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50451.json"}}],"schema_version":"1.7.5"}