CVE-2022-50335 (GCVE-0-2022-50335)
Vulnerability from cvelistv5
Published
2025-09-15 14:49
Modified
2025-09-15 14:49
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: 9p: set req refcount to zero to avoid uninitialized usage When a new request is allocated, the refcount will be zero if it is reused, but if the request is newly allocated from slab, it is not fully initialized before being added to idr. If the p9_read_work got a response before the refcount initiated. It will use a uninitialized req, which will result in a bad request data struct. Here is the logs from syzbot. Corrupted memory at 0xffff88807eade00b [ 0xff 0x07 0x00 0x00 0x00 0x00 0x00 0x00 . . . . . . . . ] (in kfence-#110): p9_fcall_fini net/9p/client.c:248 [inline] p9_req_put net/9p/client.c:396 [inline] p9_req_put+0x208/0x250 net/9p/client.c:390 p9_client_walk+0x247/0x540 net/9p/client.c:1165 clone_fid fs/9p/fid.h:21 [inline] v9fs_fid_xattr_set+0xe4/0x2b0 fs/9p/xattr.c:118 v9fs_xattr_set fs/9p/xattr.c:100 [inline] v9fs_xattr_handler_set+0x6f/0x120 fs/9p/xattr.c:159 __vfs_setxattr+0x119/0x180 fs/xattr.c:182 __vfs_setxattr_noperm+0x129/0x5f0 fs/xattr.c:216 __vfs_setxattr_locked+0x1d3/0x260 fs/xattr.c:277 vfs_setxattr+0x143/0x340 fs/xattr.c:309 setxattr+0x146/0x160 fs/xattr.c:617 path_setxattr+0x197/0x1c0 fs/xattr.c:636 __do_sys_setxattr fs/xattr.c:652 [inline] __se_sys_setxattr fs/xattr.c:648 [inline] __ia32_sys_setxattr+0xc0/0x160 fs/xattr.c:648 do_syscall_32_irqs_on arch/x86/entry/common.c:112 [inline] __do_fast_syscall_32+0x65/0xf0 arch/x86/entry/common.c:178 do_fast_syscall_32+0x33/0x70 arch/x86/entry/common.c:203 entry_SYSENTER_compat_after_hwframe+0x70/0x82 Below is a similar scenario, the scenario in the syzbot log looks more complicated than this one, but this patch can fix it. T21124 p9_read_work ======================== second trans ================================= p9_client_walk p9_client_rpc p9_client_prepare_req p9_tag_alloc req = kmem_cache_alloc(p9_req_cache, GFP_NOFS); tag = idr_alloc << preempted >> req->tc.tag = tag; /* req->[refcount/tag] == uninitialized */ m->rreq = p9_tag_lookup(m->client, m->rc.tag); /* increments uninitalized refcount */ refcount_set(&req->refcount, 2); /* cb drops one ref */ p9_client_cb(req) /* reader thread drops its ref: request is incorrectly freed */ p9_req_put(req) /* use after free and ref underflow */ p9_req_put(req) To fix it, we can initialize the refcount to zero before add to idr.
Impacted products
Vendor Product Version
Linux Linux Version: 728356dedeff8ef999cb436c71333ef4ac51a81c
Version: 728356dedeff8ef999cb436c71333ef4ac51a81c
Version: 728356dedeff8ef999cb436c71333ef4ac51a81c
Version: 728356dedeff8ef999cb436c71333ef4ac51a81c
Version: 3665a4d9dca1bd06bc34afb72e637fe01b2776ee
Create a notification for this product.
   Linux Linux Version: 4.20
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "net/9p/client.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "1cabce56626a61f4f02452cba61ad4332a4b73f8",
              "status": "affected",
              "version": "728356dedeff8ef999cb436c71333ef4ac51a81c",
              "versionType": "git"
            },
            {
              "lessThan": "73c47b3123b351de2d3714a72a336c0f72f203af",
              "status": "affected",
              "version": "728356dedeff8ef999cb436c71333ef4ac51a81c",
              "versionType": "git"
            },
            {
              "lessThan": "967fc34f297e40fd2e068cf6b0c3eb4916228539",
              "status": "affected",
              "version": "728356dedeff8ef999cb436c71333ef4ac51a81c",
              "versionType": "git"
            },
            {
              "lessThan": "26273ade77f54716e30dfd40ac6e85ceb54ac0f9",
              "status": "affected",
              "version": "728356dedeff8ef999cb436c71333ef4ac51a81c",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "3665a4d9dca1bd06bc34afb72e637fe01b2776ee",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "net/9p/client.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "4.20"
            },
            {
              "lessThan": "4.20",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.86",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.0.*",
              "status": "unaffected",
              "version": "6.0.16",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.2",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.2",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.15.86",
                  "versionStartIncluding": "4.20",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.0.16",
                  "versionStartIncluding": "4.20",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.1.2",
                  "versionStartIncluding": "4.20",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.2",
                  "versionStartIncluding": "4.20",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "4.19.57",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\n9p: set req refcount to zero to avoid uninitialized usage\n\nWhen a new request is allocated, the refcount will be zero if it is\nreused, but if the request is newly allocated from slab, it is not fully\ninitialized before being added to idr.\n\nIf the p9_read_work got a response before the refcount initiated. It will\nuse a uninitialized req, which will result in a bad request data struct.\n\nHere is the logs from syzbot.\n\nCorrupted memory at 0xffff88807eade00b [ 0xff 0x07 0x00 0x00 0x00 0x00\n0x00 0x00 . . . . . . . . ] (in kfence-#110):\n p9_fcall_fini net/9p/client.c:248 [inline]\n p9_req_put net/9p/client.c:396 [inline]\n p9_req_put+0x208/0x250 net/9p/client.c:390\n p9_client_walk+0x247/0x540 net/9p/client.c:1165\n clone_fid fs/9p/fid.h:21 [inline]\n v9fs_fid_xattr_set+0xe4/0x2b0 fs/9p/xattr.c:118\n v9fs_xattr_set fs/9p/xattr.c:100 [inline]\n v9fs_xattr_handler_set+0x6f/0x120 fs/9p/xattr.c:159\n __vfs_setxattr+0x119/0x180 fs/xattr.c:182\n __vfs_setxattr_noperm+0x129/0x5f0 fs/xattr.c:216\n __vfs_setxattr_locked+0x1d3/0x260 fs/xattr.c:277\n vfs_setxattr+0x143/0x340 fs/xattr.c:309\n setxattr+0x146/0x160 fs/xattr.c:617\n path_setxattr+0x197/0x1c0 fs/xattr.c:636\n __do_sys_setxattr fs/xattr.c:652 [inline]\n __se_sys_setxattr fs/xattr.c:648 [inline]\n __ia32_sys_setxattr+0xc0/0x160 fs/xattr.c:648\n do_syscall_32_irqs_on arch/x86/entry/common.c:112 [inline]\n __do_fast_syscall_32+0x65/0xf0 arch/x86/entry/common.c:178\n do_fast_syscall_32+0x33/0x70 arch/x86/entry/common.c:203\n entry_SYSENTER_compat_after_hwframe+0x70/0x82\n\nBelow is a similar scenario, the scenario in the syzbot log looks more\ncomplicated than this one, but this patch can fix it.\n\n     T21124                   p9_read_work\n======================== second trans =================================\np9_client_walk\n  p9_client_rpc\n    p9_client_prepare_req\n      p9_tag_alloc\n        req = kmem_cache_alloc(p9_req_cache, GFP_NOFS);\n        tag = idr_alloc\n        \u003c\u003c preempted \u003e\u003e\n        req-\u003etc.tag = tag;\n                            /* req-\u003e[refcount/tag] == uninitialized */\n                            m-\u003erreq = p9_tag_lookup(m-\u003eclient, m-\u003erc.tag);\n                              /* increments uninitalized refcount */\n\n        refcount_set(\u0026req-\u003erefcount, 2);\n                            /* cb drops one ref */\n                            p9_client_cb(req)\n                            /* reader thread drops its ref:\n                               request is incorrectly freed */\n                            p9_req_put(req)\n    /* use after free and ref underflow */\n    p9_req_put(req)\n\nTo fix it, we can initialize the refcount to zero before add to idr."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-09-15T14:49:50.150Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/1cabce56626a61f4f02452cba61ad4332a4b73f8"
        },
        {
          "url": "https://git.kernel.org/stable/c/73c47b3123b351de2d3714a72a336c0f72f203af"
        },
        {
          "url": "https://git.kernel.org/stable/c/967fc34f297e40fd2e068cf6b0c3eb4916228539"
        },
        {
          "url": "https://git.kernel.org/stable/c/26273ade77f54716e30dfd40ac6e85ceb54ac0f9"
        }
      ],
      "title": "9p: set req refcount to zero to avoid uninitialized usage",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2022-50335",
    "datePublished": "2025-09-15T14:49:50.150Z",
    "dateReserved": "2025-09-15T14:18:36.816Z",
    "dateUpdated": "2025-09-15T14:49:50.150Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2022-50335\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-09-15T15:15:45.817\",\"lastModified\":\"2025-09-15T15:22:27.090\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\n9p: set req refcount to zero to avoid uninitialized usage\\n\\nWhen a new request is allocated, the refcount will be zero if it is\\nreused, but if the request is newly allocated from slab, it is not fully\\ninitialized before being added to idr.\\n\\nIf the p9_read_work got a response before the refcount initiated. It will\\nuse a uninitialized req, which will result in a bad request data struct.\\n\\nHere is the logs from syzbot.\\n\\nCorrupted memory at 0xffff88807eade00b [ 0xff 0x07 0x00 0x00 0x00 0x00\\n0x00 0x00 . . . . . . . . ] (in kfence-#110):\\n p9_fcall_fini net/9p/client.c:248 [inline]\\n p9_req_put net/9p/client.c:396 [inline]\\n p9_req_put+0x208/0x250 net/9p/client.c:390\\n p9_client_walk+0x247/0x540 net/9p/client.c:1165\\n clone_fid fs/9p/fid.h:21 [inline]\\n v9fs_fid_xattr_set+0xe4/0x2b0 fs/9p/xattr.c:118\\n v9fs_xattr_set fs/9p/xattr.c:100 [inline]\\n v9fs_xattr_handler_set+0x6f/0x120 fs/9p/xattr.c:159\\n __vfs_setxattr+0x119/0x180 fs/xattr.c:182\\n __vfs_setxattr_noperm+0x129/0x5f0 fs/xattr.c:216\\n __vfs_setxattr_locked+0x1d3/0x260 fs/xattr.c:277\\n vfs_setxattr+0x143/0x340 fs/xattr.c:309\\n setxattr+0x146/0x160 fs/xattr.c:617\\n path_setxattr+0x197/0x1c0 fs/xattr.c:636\\n __do_sys_setxattr fs/xattr.c:652 [inline]\\n __se_sys_setxattr fs/xattr.c:648 [inline]\\n __ia32_sys_setxattr+0xc0/0x160 fs/xattr.c:648\\n do_syscall_32_irqs_on arch/x86/entry/common.c:112 [inline]\\n __do_fast_syscall_32+0x65/0xf0 arch/x86/entry/common.c:178\\n do_fast_syscall_32+0x33/0x70 arch/x86/entry/common.c:203\\n entry_SYSENTER_compat_after_hwframe+0x70/0x82\\n\\nBelow is a similar scenario, the scenario in the syzbot log looks more\\ncomplicated than this one, but this patch can fix it.\\n\\n     T21124                   p9_read_work\\n======================== second trans =================================\\np9_client_walk\\n  p9_client_rpc\\n    p9_client_prepare_req\\n      p9_tag_alloc\\n        req = kmem_cache_alloc(p9_req_cache, GFP_NOFS);\\n        tag = idr_alloc\\n        \u003c\u003c preempted \u003e\u003e\\n        req-\u003etc.tag = tag;\\n                            /* req-\u003e[refcount/tag] == uninitialized */\\n                            m-\u003erreq = p9_tag_lookup(m-\u003eclient, m-\u003erc.tag);\\n                              /* increments uninitalized refcount */\\n\\n        refcount_set(\u0026req-\u003erefcount, 2);\\n                            /* cb drops one ref */\\n                            p9_client_cb(req)\\n                            /* reader thread drops its ref:\\n                               request is incorrectly freed */\\n                            p9_req_put(req)\\n    /* use after free and ref underflow */\\n    p9_req_put(req)\\n\\nTo fix it, we can initialize the refcount to zero before add to idr.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/1cabce56626a61f4f02452cba61ad4332a4b73f8\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/26273ade77f54716e30dfd40ac6e85ceb54ac0f9\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/73c47b3123b351de2d3714a72a336c0f72f203af\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/967fc34f297e40fd2e068cf6b0c3eb4916228539\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…