{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2022-2978","assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","assignerShortName":"redhat","dateUpdated":"2024-08-03T00:53:00.619Z","dateReserved":"2022-08-24T00:00:00.000Z","datePublished":"2022-08-24T00:00:00.000Z"},"containers":{"cna":{"providerMetadata":{"orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat","dateUpdated":"2022-12-24T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"A flaw use after free in the Linux kernel NILFS file system was found in the way user triggers function security_inode_alloc to fail with following call to function nilfs_mdt_destroy. A local user could use this flaw to crash the system or potentially escalate their privileges on the system."}],"affected":[{"vendor":"n/a","product":"Kernel","versions":[{"version":"Linux kernel 6.0-rc3","status":"affected"}]}],"references":[{"url":"https://lore.kernel.org/linux-fsdevel/20220816040859.659129-1-dzm91%40hust.edu.cn/T/#u"},{"name":"[debian-lts-announce] 20221223 [SECURITY] [DLA 3245-1] linux security update","tags":["mailing-list"],"url":"https://lists.debian.org/debian-lts-announce/2022/12/msg00034.html"}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-416","cweId":"CWE-416"}]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T00:53:00.619Z"},"title":"CVE Program Container","references":[{"url":"https://lore.kernel.org/linux-fsdevel/20220816040859.659129-1-dzm91%40hust.edu.cn/T/#u","tags":["x_transferred"]},{"name":"[debian-lts-announce] 20221223 [SECURITY] [DLA 3245-1] linux security update","tags":["mailing-list","x_transferred"],"url":"https://lists.debian.org/debian-lts-announce/2022/12/msg00034.html"}]}]}}