-

CVE-2022-50367

In the Linux kernel, the following vulnerability has been resolved:

fs: fix UAF/GPF bug in nilfs_mdt_destroy

In alloc_inode, inode_init_always() could return -ENOMEM if
security_inode_alloc() fails, which causes inode->i_private
uninitialized. Then nilfs_is_metadata_file_inode() returns
true and nilfs_free_inode() wrongly calls nilfs_mdt_destroy(),
which frees the uninitialized inode->i_private
and leads to crashes(e.g., UAF/GPF).

Fix this by moving security_inode_alloc just prior to
this_cpu_inc(nr_inodes)

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < d1ff475d7c83289d0a7faef346ea3bbf90818bad
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < c0aa76b0f17f59dd9c9d3463550a2986a1d592e4
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < ec2aab115eb38ac4992ea2fcc2a02fbe7af5cf48
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 70e4f70d54e0225f91814e8610477d65f33cefe4
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 1e555c3ed1fce4b278aaebe18a64a934cece57d8
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 64b79e632869ad3ef6c098a4731d559381da1115
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 81de80330fa6907aec32eb54c5619059e6e36452
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 2a96b532098284ecf8e4849b8b9e5fc7a28bdee9
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 2e488f13755ffbb60f307e991b27024716a33b29
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version <= 4.9.*
Version 4.9.331
Status unaffected
Version <= 4.14.*
Version 4.14.296
Status unaffected
Version <= 4.19.*
Version 4.19.262
Status unaffected
Version <= 5.4.*
Version 5.4.218
Status unaffected
Version <= 5.10.*
Version 5.10.148
Status unaffected
Version <= 5.15.*
Version 5.15.73
Status unaffected
Version <= 5.19.*
Version 5.19.15
Status unaffected
Version <= 6.0.*
Version 6.0.1
Status unaffected
Version <= *
Version 6.1
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.04% 0.127
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string