Bug 2140882 (CVE-2022-3649) - CVE-2022-3649 kernel: nilfs2: use-after-free in nilfs_new_inode of fs/nilfs2/inode.c
Summary: CVE-2022-3649 kernel: nilfs2: use-after-free in nilfs_new_inode of fs/nilfs2/...
Keywords:
Status: CLOSED NOTABUG
Alias: CVE-2022-3649
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks: 2136784
TreeView+ depends on / blocked
 
Reported: 2022-11-08 03:10 UTC by TEJ RATHI
Modified: 2023-02-07 12:04 UTC (History)
36 users (show)

Fixed In Version: kernel 6.1-rc1
Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in the NILFS2 file system implementation in the Linux kernel. If the beginning of the inode bitmap area was corrupted on disk, an inode with the same inode number as the root inode could be allocated and fail soon after. The subsequent call to nilfs_clear_inode() wrongly decremented the reference counter of struct nilfs_root, leading to a use-after-free issue. A user permitted to mount arbitrary file system images could use this flaw to cause a denial of service.
Clone Of:
Environment:
Last Closed: 2022-12-21 11:22:39 UTC
Embargoed:


Attachments (Terms of Use)

Description TEJ RATHI 2022-11-08 03:10:42 UTC
A flaw was found in the NILFS2 file system implementation in the Linux kernel. If the beginning of the inode bitmap area was corrupted on disk, an inode with the same inode number as the root inode could be allocated and fail soon after. The subsequent call to nilfs_clear_inode() wrongly decremented the reference counter of struct nilfs_root, leading to a use-after-free issue. A user permitted to mount arbitrary file system images could use this flaw to cause a denial of service.

https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=d325dc6eb763c10f591c239550b8c7e5466a5d09
https://vuldb.com/?id.211992
https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html


Note You need to log in before you can comment on or make changes to this bug.