CVE-2022-50546

EUVD-2025-32001
In the Linux kernel, the following vulnerability has been resolved:

ext4: fix uninititialized value in 'ext4_evict_inode'

Syzbot found the following issue:
=====================================================
BUG: KMSAN: uninit-value in ext4_evict_inode+0xdd/0x26b0 fs/ext4/inode.c:180
 ext4_evict_inode+0xdd/0x26b0 fs/ext4/inode.c:180
 evict+0x365/0x9a0 fs/inode.c:664
 iput_final fs/inode.c:1747 [inline]
 iput+0x985/0xdd0 fs/inode.c:1773
 __ext4_new_inode+0xe54/0x7ec0 fs/ext4/ialloc.c:1361
 ext4_mknod+0x376/0x840 fs/ext4/namei.c:2844
 vfs_mknod+0x79d/0x830 fs/namei.c:3914
 do_mknodat+0x47d/0xaa0
 __do_sys_mknodat fs/namei.c:3992 [inline]
 __se_sys_mknodat fs/namei.c:3989 [inline]
 __ia32_sys_mknodat+0xeb/0x150 fs/namei.c:3989
 do_syscall_32_irqs_on arch/x86/entry/common.c:112 [inline]
 __do_fast_syscall_32+0xa2/0x100 arch/x86/entry/common.c:178
 do_fast_syscall_32+0x33/0x70 arch/x86/entry/common.c:203
 do_SYSENTER_32+0x1b/0x20 arch/x86/entry/common.c:246
 entry_SYSENTER_compat_after_hwframe+0x70/0x82

Uninit was created at:
 __alloc_pages+0x9f1/0xe80 mm/page_alloc.c:5578
 alloc_pages+0xaae/0xd80 mm/mempolicy.c:2285
 alloc_slab_page mm/slub.c:1794 [inline]
 allocate_slab+0x1b5/0x1010 mm/slub.c:1939
 new_slab mm/slub.c:1992 [inline]
 ___slab_alloc+0x10c3/0x2d60 mm/slub.c:3180
 __slab_alloc mm/slub.c:3279 [inline]
 slab_alloc_node mm/slub.c:3364 [inline]
 slab_alloc mm/slub.c:3406 [inline]
 __kmem_cache_alloc_lru mm/slub.c:3413 [inline]
 kmem_cache_alloc_lru+0x6f3/0xb30 mm/slub.c:3429
 alloc_inode_sb include/linux/fs.h:3117 [inline]
 ext4_alloc_inode+0x5f/0x860 fs/ext4/super.c:1321
 alloc_inode+0x83/0x440 fs/inode.c:259
 new_inode_pseudo fs/inode.c:1018 [inline]
 new_inode+0x3b/0x430 fs/inode.c:1046
 __ext4_new_inode+0x2a7/0x7ec0 fs/ext4/ialloc.c:959
 ext4_mkdir+0x4d5/0x1560 fs/ext4/namei.c:2992
 vfs_mkdir+0x62a/0x870 fs/namei.c:4035
 do_mkdirat+0x466/0x7b0 fs/namei.c:4060
 __do_sys_mkdirat fs/namei.c:4075 [inline]
 __se_sys_mkdirat fs/namei.c:4073 [inline]
 __ia32_sys_mkdirat+0xc4/0x120 fs/namei.c:4073
 do_syscall_32_irqs_on arch/x86/entry/common.c:112 [inline]
 __do_fast_syscall_32+0xa2/0x100 arch/x86/entry/common.c:178
 do_fast_syscall_32+0x33/0x70 arch/x86/entry/common.c:203
 do_SYSENTER_32+0x1b/0x20 arch/x86/entry/common.c:246
 entry_SYSENTER_compat_after_hwframe+0x70/0x82

CPU: 1 PID: 4625 Comm: syz-executor.2 Not tainted 6.1.0-rc4-syzkaller-62821-gcb231e2f67ec #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
=====================================================

Now, 'ext4_alloc_inode()' didn't init 'ei->i_flags'. If new inode failed
before set 'ei->i_flags' in '__ext4_new_inode()', then do 'iput()'. As after
6bc0d63dad7f commit will access 'ei->i_flags' in 'ext4_evict_inode()' which
will lead to access uninit-value.
To solve above issue just init 'ei->i_flags' in 'ext4_alloc_inode()'.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.8 HIGH
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 4%
Affected Products (NVD)
VendorProductVersion
linuxlinux_kernel
5.15.61 ≤
𝑥
< 5.15.87
linuxlinux_kernel
5.18.18 ≤
𝑥
< 5.19
linuxlinux_kernel
5.19.2 ≤
𝑥
< 6.0.18
linuxlinux_kernel
6.1 ≤
𝑥
< 6.1.4
linuxlinux_kernel
5.10.163
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
linux
bookworm
6.1.148-1
fixed
bookworm (security)
6.1.153-1
fixed
bullseye
5.10.223-1
fixed
bullseye (security)
5.10.237-1
fixed
forky
6.16.9-1
fixed
sid
6.16.11-1
fixed
trixie
6.12.43-1
fixed
trixie (security)
6.12.48-1
fixed
openSUSE logo
openSUSE / SLES Releases
openSUSE Product
Release
cluster-md-kmp-default
suse enterprise server 15 SP5
5.14.21-150500.55.127.1
fixed
dlm-kmp-default
suse enterprise server 15 SP5
5.14.21-150500.55.127.1
fixed
gfs2-kmp-default
suse enterprise server 15 SP5
5.14.21-150500.55.127.1
fixed
kernel-64kb
suse enterprise server 15 SP3
5.3.18-150300.59.226.2
fixed
suse enterprise server 15 SP4
5.14.21-150400.24.184.1
fixed
suse enterprise server 15 SP5
5.14.21-150500.55.127.1
fixed
kernel-default
suse enterprise server 15 SP3
5.3.18-150300.59.226.2
fixed
suse enterprise server 15 SP4
5.14.21-150400.24.184.1
fixed
suse enterprise server 15 SP5
5.14.21-150500.55.127.1
fixed
kernel-default-base
suse enterprise server 15 SP3
5.3.18-150300.59.226.2.150300.18.134.2
fixed
suse enterprise server 15 SP4
5.14.21-150400.24.184.1.150400.24.94.2
fixed
suse enterprise server 15 SP5
5.14.21-150500.55.127.1.150500.6.61.1
fixed
kernel-docs
suse enterprise server 15 SP3
5.3.18-150300.59.226.3
fixed
suse enterprise server 15 SP4
5.14.21-150400.24.184.1
fixed
suse enterprise server 15 SP5
5.14.21-150500.55.127.1
fixed
kernel-macros
suse enterprise server 15 SP3
5.3.18-150300.59.226.2
fixed
suse enterprise server 15 SP4
5.14.21-150400.24.184.1
fixed
suse enterprise server 15 SP5
5.14.21-150500.55.127.1
fixed
kernel-obs-build
suse enterprise server 15 SP3
5.3.18-150300.59.226.2
fixed
suse enterprise server 15 SP4
5.14.21-150400.24.184.1
fixed
suse enterprise server 15 SP5
5.14.21-150500.55.127.1
fixed
kernel-preempt
suse enterprise server 15 SP3
5.3.18-150300.59.226.2
fixed
kernel-source
suse enterprise server 15 SP3
5.3.18-150300.59.226.2
fixed
suse enterprise server 15 SP4
5.14.21-150400.24.184.1
fixed
suse enterprise server 15 SP5
5.14.21-150500.55.127.1
fixed
kernel-syms
suse enterprise server 15 SP3
5.3.18-150300.59.226.1
fixed
suse enterprise server 15 SP4
5.14.21-150400.24.184.1
fixed
suse enterprise server 15 SP5
5.14.21-150500.55.127.1
fixed
kernel-zfcpdump
suse enterprise server 15 SP3
5.3.18-150300.59.226.2
fixed
suse enterprise server 15 SP4
5.14.21-150400.24.184.1
fixed
suse enterprise server 15 SP5
5.14.21-150500.55.127.1
fixed
ocfs2-kmp-default
suse enterprise server 15 SP5
5.14.21-150500.55.127.1
fixed
reiserfs-kmp-default
suse enterprise server 15 SP3
5.3.18-150300.59.226.2
fixed
suse enterprise server 15 SP4
5.14.21-150400.24.184.1
fixed
suse enterprise server 15 SP5
5.14.21-150500.55.127.1
fixed
Red Hat logo
Red Hat Enterprise Linux Releases
Red Hat Product
Release
bpftool
RHEL 8
0:4.18.0-553.el8_10
fixed
RHEL 9
0:7.0.0-284.11.1.el9_2
fixed
kernel
RHEL 8
0:4.18.0-553.el8_10
fixed
RHEL 9
0:5.14.0-284.11.1.el9_2
fixed
kernel-64k
RHEL 9
0:5.14.0-284.11.1.el9_2
fixed
kernel-64k-core
RHEL 9
0:5.14.0-284.11.1.el9_2
fixed
kernel-64k-debug
RHEL 9
0:5.14.0-284.11.1.el9_2
fixed
kernel-64k-debug-core
RHEL 9
0:5.14.0-284.11.1.el9_2
fixed
kernel-64k-debug-devel
RHEL 9
0:5.14.0-284.11.1.el9_2
fixed
kernel-64k-debug-devel-matched
RHEL 9
0:5.14.0-284.11.1.el9_2
fixed
kernel-64k-debug-modules
RHEL 9
0:5.14.0-284.11.1.el9_2
fixed
kernel-64k-debug-modules-core
RHEL 9
0:5.14.0-284.11.1.el9_2
fixed
kernel-64k-debug-modules-extra
RHEL 9
0:5.14.0-284.11.1.el9_2
fixed
kernel-64k-devel
RHEL 9
0:5.14.0-284.11.1.el9_2
fixed
kernel-64k-devel-matched
RHEL 9
0:5.14.0-284.11.1.el9_2
fixed
kernel-64k-modules
RHEL 9
0:5.14.0-284.11.1.el9_2
fixed
kernel-64k-modules-core
RHEL 9
0:5.14.0-284.11.1.el9_2
fixed
kernel-64k-modules-extra
RHEL 9
0:5.14.0-284.11.1.el9_2
fixed
kernel-abi-stablelists
RHEL 8
0:4.18.0-553.el8_10
fixed
RHEL 9
0:5.14.0-284.11.1.el9_2
fixed
kernel-core
RHEL 8
0:4.18.0-553.el8_10
fixed
RHEL 9
0:5.14.0-284.11.1.el9_2
fixed
kernel-debug
RHEL 8
0:4.18.0-553.el8_10
fixed
RHEL 9
0:5.14.0-284.11.1.el9_2
fixed
kernel-debug-core
RHEL 8
0:4.18.0-553.el8_10
fixed
RHEL 9
0:5.14.0-284.11.1.el9_2
fixed
kernel-debug-devel
RHEL 8
0:4.18.0-553.el8_10
fixed
RHEL 9
0:5.14.0-284.11.1.el9_2
fixed
kernel-debug-devel-matched
RHEL 9
0:5.14.0-284.11.1.el9_2
fixed
kernel-debug-modules
RHEL 8
0:4.18.0-553.el8_10
fixed
RHEL 9
0:5.14.0-284.11.1.el9_2
fixed
kernel-debug-modules-core
RHEL 9
0:5.14.0-284.11.1.el9_2
fixed
kernel-debug-modules-extra
RHEL 8
0:4.18.0-553.el8_10
fixed
RHEL 9
0:5.14.0-284.11.1.el9_2
fixed
kernel-debug-uki-virt
RHEL 9
0:5.14.0-284.11.1.el9_2
fixed
kernel-devel
RHEL 8
0:4.18.0-553.el8_10
fixed
RHEL 9
0:5.14.0-284.11.1.el9_2
fixed
kernel-devel-matched
RHEL 9
0:5.14.0-284.11.1.el9_2
fixed
kernel-doc
RHEL 8
0:4.18.0-553.el8_10
fixed
RHEL 9
0:5.14.0-284.11.1.el9_2
fixed
kernel-modules
RHEL 8
0:4.18.0-553.el8_10
fixed
RHEL 9
0:5.14.0-284.11.1.el9_2
fixed
kernel-modules-core
RHEL 9
0:5.14.0-284.11.1.el9_2
fixed
kernel-modules-extra
RHEL 8
0:4.18.0-553.el8_10
fixed
RHEL 9
0:5.14.0-284.11.1.el9_2
fixed
kernel-tools
RHEL 8
0:4.18.0-553.el8_10
fixed
RHEL 9
0:5.14.0-284.11.1.el9_2
fixed
kernel-tools-libs
RHEL 8
0:4.18.0-553.el8_10
fixed
RHEL 9
0:5.14.0-284.11.1.el9_2
fixed
kernel-tools-libs-devel
RHEL 8
0:4.18.0-553.el8_10
fixed
RHEL 9
0:5.14.0-284.11.1.el9_2
fixed
kernel-uki-virt
RHEL 9
0:5.14.0-284.11.1.el9_2
fixed
kernel-zfcpdump
RHEL 8
0:4.18.0-553.el8_10
fixed
RHEL 9
0:5.14.0-284.11.1.el9_2
fixed
kernel-zfcpdump-core
RHEL 8
0:4.18.0-553.el8_10
fixed
RHEL 9
0:5.14.0-284.11.1.el9_2
fixed
kernel-zfcpdump-devel
RHEL 8
0:4.18.0-553.el8_10
fixed
RHEL 9
0:5.14.0-284.11.1.el9_2
fixed
kernel-zfcpdump-devel-matched
RHEL 9
0:5.14.0-284.11.1.el9_2
fixed
kernel-zfcpdump-modules
RHEL 8
0:4.18.0-553.el8_10
fixed
RHEL 9
0:5.14.0-284.11.1.el9_2
fixed
kernel-zfcpdump-modules-core
RHEL 9
0:5.14.0-284.11.1.el9_2
fixed
kernel-zfcpdump-modules-extra
RHEL 8
0:4.18.0-553.el8_10
fixed
RHEL 9
0:5.14.0-284.11.1.el9_2
fixed
perf
RHEL 8
0:4.18.0-553.el8_10
fixed
RHEL 9
0:5.14.0-284.11.1.el9_2
fixed
python3-perf
RHEL 8
0:4.18.0-553.el8_10
fixed
RHEL 9
0:5.14.0-284.11.1.el9_2
fixed
rtla
RHEL 9
0:5.14.0-284.11.1.el9_2
fixed