-

CVE-2022-50367

In the Linux kernel, the following vulnerability has been resolved:

fs: fix UAF/GPF bug in nilfs_mdt_destroy

In alloc_inode, inode_init_always() could return -ENOMEM if
security_inode_alloc() fails, which causes inode->i_private
uninitialized. Then nilfs_is_metadata_file_inode() returns
true and nilfs_free_inode() wrongly calls nilfs_mdt_destroy(),
which frees the uninitialized inode->i_private
and leads to crashes(e.g., UAF/GPF).

Fix this by moving security_inode_alloc just prior to
this_cpu_inc(nr_inodes)

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < d1ff475d7c83289d0a7faef346ea3bbf90818bad
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < c0aa76b0f17f59dd9c9d3463550a2986a1d592e4
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < ec2aab115eb38ac4992ea2fcc2a02fbe7af5cf48
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 70e4f70d54e0225f91814e8610477d65f33cefe4
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 1e555c3ed1fce4b278aaebe18a64a934cece57d8
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 64b79e632869ad3ef6c098a4731d559381da1115
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 81de80330fa6907aec32eb54c5619059e6e36452
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 2a96b532098284ecf8e4849b8b9e5fc7a28bdee9
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 2e488f13755ffbb60f307e991b27024716a33b29
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version <= 4.9.*
Version 4.9.331
Status unaffected
Version <= 4.14.*
Version 4.14.296
Status unaffected
Version <= 4.19.*
Version 4.19.262
Status unaffected
Version <= 5.4.*
Version 5.4.218
Status unaffected
Version <= 5.10.*
Version 5.10.148
Status unaffected
Version <= 5.15.*
Version 5.15.73
Status unaffected
Version <= 5.19.*
Version 5.19.15
Status unaffected
Version <= 6.0.*
Version 6.0.1
Status unaffected
Version <= *
Version 6.1
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.04% 0.127
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String