CVE-2022-50432Use After Free in Linux

Severity
7.8HIGHNVD
EPSS
0.0%
top 96.97%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 1

Description

In the Linux kernel, the following vulnerability has been resolved: kernfs: fix use-after-free in __kernfs_remove Syzkaller managed to trigger concurrent calls to kernfs_remove_by_name_ns() for the same file resulting in a KASAN detected use-after-free. The race occurs when the root node is freed during kernfs_drain(). To prevent this acquire an additional reference for the root of the tree that is removed before calling __kernfs_remove(). Found by syzkaller with the following reproducer (sl

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages4 packages

NVDlinux/linux_kernel3.144.9.332+6
Debianlinux/linux_kernel< 5.10.158-1+3
CVEListV5linux/linux45a140e587f3d32d8d424ed940dffb61e17390474dfd6a477a1525773469feaf3c514b2c0fef76b5+8
debiandebian/linux< linux 6.0.7-1 (bookworm)

Patches

🔴Vulnerability Details

2
GHSA
GHSA-pr4f-7xjv-67x4: In the Linux kernel, the following vulnerability has been resolved: kernfs: fix use-after-free in __kernfs_remove Syzkaller managed to trigger concu2025-10-01
OSV
CVE-2022-50432: In the Linux kernel, the following vulnerability has been resolved: kernfs: fix use-after-free in __kernfs_remove Syzkaller managed to trigger concurr2025-10-01

📋Vendor Advisories

2
Red Hat
kernel: kernfs: fix use-after-free in __kernfs_remove2025-10-01
Debian
CVE-2022-50432: linux - In the Linux kernel, the following vulnerability has been resolved: kernfs: fix...2022