CVE-2022-50673

Source
https://cve.org/CVERecord?id=CVE-2022-50673
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50673.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-50673
Downstream
Related
Published
2025-12-09T01:29:25.220Z
Modified
2026-03-20T11:47:34.858685Z
Summary
ext4: fix use-after-free in ext4_orphan_cleanup
Details

In the Linux kernel, the following vulnerability has been resolved:

ext4: fix use-after-free in ext4orphancleanup

I caught a issue as follows:

BUG: KASAN: use-after-free in __listaddvalid+0x28/0x1a0 Read of size 8 at addr ffff88814b13f378 by task mount/710

CPU: 1 PID: 710 Comm: mount Not tainted 6.1.0-rc3-next #370 Call Trace: <TASK> dumpstacklvl+0x73/0x9f printreport+0x25d/0x759 kasanreport+0xc0/0x120 __asan_load8+0x99/0x140 __listaddvalid+0x28/0x1a0 ext4orphancleanup+0x564/0x9d0 [ext4] __ext4fillsuper+0x48e2/0x5300 [ext4] ext4fillsuper+0x19f/0x3a0 [ext4] gettreebdev+0x27b/0x450 ext4gettree+0x19/0x30 [ext4] vfsgettree+0x49/0x150 pathmount+0xaae/0x1350 domount+0xe2/0x110 __x64sysmount+0xf0/0x190 dosyscall64+0x35/0x80 entrySYSCALL64afterhwframe+0x63/0xcd </TASK>

[...]

Above issue may happen as follows:

ext4fillsuper ext4orphancleanup --- loop1: assume lastorphan is 12 --- listadd(&EXT4I(inode)->iorphan, &EXT4SB(sb)->sorphan) ext4truncate --> return 0 ext4inodeattachjinode --> return -ENOMEM iput(inode) --> free inode<12> --- loop2: lastorphan is still 12 --- listadd(&EXT4I(inode)->iorphan, &EXT4SB(sb)->sorphan); // use inode<12> and trigger UAF

To solve this issue, we need to propagate the return value of ext4inodeattach_jinode() appropriately.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50673.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
2c98eb5ea249767bbc11cf4e70e91d5b0458ed13
Fixed
7f801a1593cb957f73659732836b2dafbdfc7709
Fixed
026a4490b5381229a30f23d073b58e8e35ee6858
Fixed
7223d5e75f26352354ea2c0ccf8b579821b52adf
Fixed
cf0e0817b0f925b70d101d7014ea81b7094e1159
Fixed
c2bdbd4c69308835d1b6f6ba74feeccbfe113478
Fixed
7908b8a541b1578cc61b4da7f19b604a931441da
Fixed
a71248b1accb2b42e4980afef4fa4a27fa0e36f5

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50673.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.10.0
Fixed
4.19.270
Type
ECOSYSTEM
Events
Introduced
4.20.0
Fixed
5.4.229
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.163
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.87
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.0.18
Type
ECOSYSTEM
Events
Introduced
6.1.0
Fixed
6.1.4

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50673.json"