CVE-2022-50241

Source
https://cve.org/CVERecord?id=CVE-2022-50241
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50241.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-50241
Downstream
Related
Published
2025-09-15T14:01:47.539Z
Modified
2026-03-20T11:47:20.887895Z
Summary
NFSD: fix use-after-free on source server when doing inter-server copy
Details

In the Linux kernel, the following vulnerability has been resolved:

NFSD: fix use-after-free on source server when doing inter-server copy

Use-after-free occurred when the laundromat tried to free expired cpntfstate entry on the s2scpstateids list after inter-server copy completed. The sccp_list that the expired copy state was inserted on was already freed.

When COPY completes, the Linux client normally sends LOCKU(lockstate x), FREESTATEID(lockstate x) and CLOSE(openstate y) to the source server. The nfs4putstid call from nfsd4freestateid cleans up the copy state from the s2scpstateids list before freeing the lock state's stid.

However, sometimes the CLOSE was sent before the FREESTATEID request. When this happens, the nfsd4closeopenstateid call from nfsd4close frees all lock states on its stlocks list without cleaning up the copy state on the sccplist list. When the time the FREESTATEID arrives the server returns BADSTATEID since the lock state was freed. This causes the use-after-free error to occur when the laundromat tries to free the expired cpntf_state.

This patch adds a call to nfs4freecpntfstatelist in nfsd4closeopenstateid to clean up the copy state before calling freeolstateid_reaplist to free the lock state's stid on the reaplist.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50241.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
624322f1adc58acd0b69f77a6ddc764207e97241
Fixed
bbacfcde5fff25ac22597e8373a065c647da6738
Fixed
83b94969751a691347606dbe6b1865efcfa5a643
Fixed
6ea71246b7a02af675d733e72d14bd0d591d5f4a
Fixed
35aa0fb8c3033a3d78603356e96fc18c5b9cceb2
Fixed
019805fea91599b22dfa62ffb29c022f35abeb06

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50241.json"