CVE-2022-50148

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-50148
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50148.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-50148
Downstream
Published
2025-06-18T11:03:08Z
Modified
2025-10-16T06:35:30.540327Z
Summary
kernfs: fix potential NULL dereference in __kernfs_remove
Details

In the Linux kernel, the following vulnerability has been resolved:

kernfs: fix potential NULL dereference in _kernfsremove

When lockdep is enabled, lockdepassertheld_write would cause potential NULL pointer dereference.

Fix the following smatch warnings:

fs/kernfs/dir.c:1353 _kernfsremove() warn: variable dereferenced before check 'kn' (see line 1346)

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
393c3714081a53795bbff0e985d24146def6f57f
Fixed
b871986d9d3071f5082664ac274d93f08db257cd
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
393c3714081a53795bbff0e985d24146def6f57f
Fixed
4a9f35b8729c5bf13ea671c908c17ed74c48fc50
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
393c3714081a53795bbff0e985d24146def6f57f
Fixed
72b5d5aef246a0387cefa23121dd90901c7a691a

Affected versions

v5.*

v5.16
v5.16-rc3
v5.16-rc4
v5.16-rc5
v5.16-rc6
v5.16-rc7
v5.16-rc8
v5.17
v5.17-rc1
v5.17-rc2
v5.17-rc3
v5.17-rc4
v5.17-rc5
v5.17-rc6
v5.17-rc7
v5.17-rc8
v5.18
v5.18-rc1
v5.18-rc2
v5.18-rc3
v5.18-rc4
v5.18-rc5
v5.18-rc6
v5.18-rc7
v5.18.1
v5.18.10
v5.18.11
v5.18.12
v5.18.13
v5.18.14
v5.18.15
v5.18.16
v5.18.17
v5.18.2
v5.18.3
v5.18.4
v5.18.5
v5.18.6
v5.18.7
v5.18.8
v5.18.9
v5.19
v5.19-rc1
v5.19-rc2
v5.19-rc3
v5.19-rc4
v5.19-rc5
v5.19-rc6
v5.19-rc7
v5.19-rc8
v5.19.1

Database specific

vanir_signatures

[
    {
        "id": "CVE-2022-50148-8e507743",
        "deprecated": false,
        "signature_type": "Line",
        "target": {
            "file": "fs/kernfs/dir.c"
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@72b5d5aef246a0387cefa23121dd90901c7a691a",
        "digest": {
            "line_hashes": [
                "102297932054569548466796586634601467256",
                "257294277814308995971772954941860965273",
                "76513098418875288294761635668334131606",
                "226983321628395320507329176924400382777",
                "25895428251156041022617663687707530334"
            ],
            "threshold": 0.9
        },
        "signature_version": "v1"
    },
    {
        "id": "CVE-2022-50148-a2242d60",
        "deprecated": false,
        "signature_type": "Function",
        "target": {
            "file": "fs/kernfs/dir.c",
            "function": "__kernfs_remove"
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b871986d9d3071f5082664ac274d93f08db257cd",
        "digest": {
            "length": 819.0,
            "function_hash": "293845012129116837747532712150177236629"
        },
        "signature_version": "v1"
    },
    {
        "id": "CVE-2022-50148-c69eeb0b",
        "deprecated": false,
        "signature_type": "Function",
        "target": {
            "file": "fs/kernfs/dir.c",
            "function": "__kernfs_remove"
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4a9f35b8729c5bf13ea671c908c17ed74c48fc50",
        "digest": {
            "length": 819.0,
            "function_hash": "293845012129116837747532712150177236629"
        },
        "signature_version": "v1"
    },
    {
        "id": "CVE-2022-50148-cd7bbce3",
        "deprecated": false,
        "signature_type": "Function",
        "target": {
            "file": "fs/kernfs/dir.c",
            "function": "__kernfs_remove"
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@72b5d5aef246a0387cefa23121dd90901c7a691a",
        "digest": {
            "length": 819.0,
            "function_hash": "293845012129116837747532712150177236629"
        },
        "signature_version": "v1"
    },
    {
        "id": "CVE-2022-50148-f820e412",
        "deprecated": false,
        "signature_type": "Line",
        "target": {
            "file": "fs/kernfs/dir.c"
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4a9f35b8729c5bf13ea671c908c17ed74c48fc50",
        "digest": {
            "line_hashes": [
                "102297932054569548466796586634601467256",
                "257294277814308995971772954941860965273",
                "76513098418875288294761635668334131606",
                "226983321628395320507329176924400382777",
                "25895428251156041022617663687707530334"
            ],
            "threshold": 0.9
        },
        "signature_version": "v1"
    },
    {
        "id": "CVE-2022-50148-f9c5faaa",
        "deprecated": false,
        "signature_type": "Line",
        "target": {
            "file": "fs/kernfs/dir.c"
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b871986d9d3071f5082664ac274d93f08db257cd",
        "digest": {
            "line_hashes": [
                "102297932054569548466796586634601467256",
                "257294277814308995971772954941860965273",
                "76513098418875288294761635668334131606",
                "226983321628395320507329176924400382777",
                "25895428251156041022617663687707530334"
            ],
            "threshold": 0.9
        },
        "signature_version": "v1"
    }
]

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.17.0
Fixed
5.18.18
Type
ECOSYSTEM
Events
Introduced
5.19.0
Fixed
5.19.2