CVE-2022-50367

In the Linux kernel, the following vulnerability has been resolved: fs: fix UAF/GPF bug in nilfs_mdt_destroy In alloc_inode, inode_init_always() could return -ENOMEM if security_inode_alloc() fails, which causes inode->i_private uninitialized. Then nilfs_is_metadata_file_inode() returns true and nilfs_free_inode() wrongly calls nilfs_mdt_destroy(), which frees the uninitialized inode->i_private and leads to crashes(e.g., UAF/GPF). Fix this by moving security_inode_alloc just prior to this_cpu_inc(nr_inodes)
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

10 Dec 2025, 18:23

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
First Time Linux
Linux linux Kernel
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/1e555c3ed1fce4b278aaebe18a64a934cece57d8 - () https://git.kernel.org/stable/c/1e555c3ed1fce4b278aaebe18a64a934cece57d8 - Patch
References () https://git.kernel.org/stable/c/2a96b532098284ecf8e4849b8b9e5fc7a28bdee9 - () https://git.kernel.org/stable/c/2a96b532098284ecf8e4849b8b9e5fc7a28bdee9 - Patch
References () https://git.kernel.org/stable/c/2e488f13755ffbb60f307e991b27024716a33b29 - () https://git.kernel.org/stable/c/2e488f13755ffbb60f307e991b27024716a33b29 - Patch
References () https://git.kernel.org/stable/c/64b79e632869ad3ef6c098a4731d559381da1115 - () https://git.kernel.org/stable/c/64b79e632869ad3ef6c098a4731d559381da1115 - Patch
References () https://git.kernel.org/stable/c/70e4f70d54e0225f91814e8610477d65f33cefe4 - () https://git.kernel.org/stable/c/70e4f70d54e0225f91814e8610477d65f33cefe4 - Patch
References () https://git.kernel.org/stable/c/81de80330fa6907aec32eb54c5619059e6e36452 - () https://git.kernel.org/stable/c/81de80330fa6907aec32eb54c5619059e6e36452 - Patch
References () https://git.kernel.org/stable/c/c0aa76b0f17f59dd9c9d3463550a2986a1d592e4 - () https://git.kernel.org/stable/c/c0aa76b0f17f59dd9c9d3463550a2986a1d592e4 - Patch
References () https://git.kernel.org/stable/c/d1ff475d7c83289d0a7faef346ea3bbf90818bad - () https://git.kernel.org/stable/c/d1ff475d7c83289d0a7faef346ea3bbf90818bad - Patch
References () https://git.kernel.org/stable/c/ec2aab115eb38ac4992ea2fcc2a02fbe7af5cf48 - () https://git.kernel.org/stable/c/ec2aab115eb38ac4992ea2fcc2a02fbe7af5cf48 - Patch
CWE CWE-416

17 Sep 2025, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-09-17 15:15

Updated : 2025-12-10 18:23


NVD link : CVE-2022-50367

Mitre link : CVE-2022-50367

CVE.ORG link : CVE-2022-50367


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free