ghsa-x7fv-mvjx-m6c8
Vulnerability from github
In the Linux kernel, the following vulnerability has been resolved:
erofs: Fix pcluster memleak when its block address is zero
syzkaller reported a memleak: https://syzkaller.appspot.com/bug?id=62f37ff612f0021641eda5b17f056f1668aa9aed
unreferenced object 0xffff88811009c7f8 (size 136): ... backtrace: [] z_erofs_do_read_page+0x99b/0x1740 [] z_erofs_readahead+0x24e/0x580 [] read_pages+0x86/0x3d0 ...
syzkaller constructed a case: in z_erofs_register_pcluster(), ztailpacking = false and map->m_pa = zero. This makes pcl->obj.index be zero although pcl is not a inline pcluster.
Then following path adds refcount for grp, but the refcount won't be put because pcl is inline.
z_erofs_readahead() z_erofs_do_read_page() # for another page z_erofs_collector_begin() erofs_find_workgroup() erofs_workgroup_get()
Since it's illegal for the block address of a non-inlined pcluster to be zero, add check here to avoid registering the pcluster which would be leaked.
{
"affected": [],
"aliases": [
"CVE-2022-50743"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-12-24T13:16:01Z",
"severity": null
},
"details": "In the Linux kernel, the following vulnerability has been resolved:\n\nerofs: Fix pcluster memleak when its block address is zero\n\nsyzkaller reported a memleak:\nhttps://syzkaller.appspot.com/bug?id=62f37ff612f0021641eda5b17f056f1668aa9aed\n\nunreferenced object 0xffff88811009c7f8 (size 136):\n ...\n backtrace:\n [\u003cffffffff821db19b\u003e] z_erofs_do_read_page+0x99b/0x1740\n [\u003cffffffff821dee9e\u003e] z_erofs_readahead+0x24e/0x580\n [\u003cffffffff814bc0d6\u003e] read_pages+0x86/0x3d0\n ...\n\nsyzkaller constructed a case: in z_erofs_register_pcluster(),\nztailpacking = false and map-\u003em_pa = zero. This makes pcl-\u003eobj.index be\nzero although pcl is not a inline pcluster.\n\nThen following path adds refcount for grp, but the refcount won\u0027t be put\nbecause pcl is inline.\n\nz_erofs_readahead()\n z_erofs_do_read_page() # for another page\n z_erofs_collector_begin()\n erofs_find_workgroup()\n erofs_workgroup_get()\n\nSince it\u0027s illegal for the block address of a non-inlined pcluster to\nbe zero, add check here to avoid registering the pcluster which would\nbe leaked.",
"id": "GHSA-x7fv-mvjx-m6c8",
"modified": "2025-12-24T15:30:33Z",
"published": "2025-12-24T15:30:33Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50743"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/618e712b99c78d1004b70a1a9ab0a4830d0b2673"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/ac54c1f7b288d83b6ba1e320efff24ecc21309cd"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/c42c0ffe81176940bd5dead474216b7198d77675"
}
],
"schema_version": "1.4.0",
"severity": []
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.