{
  "threat_severity" : "Low",
  "public_date" : "2025-09-17T00:00:00Z",
  "bugzilla" : {
    "description" : "kernel: cifs: Fix memory leak when build ntlmssp negotiate blob failed",
    "id" : "2396108",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2396108"
  },
  "cvss3" : {
    "cvss3_base_score" : "5.5",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
    "status" : "verified"
  },
  "cwe" : "CWE-772",
  "details" : [ "In the Linux kernel, the following vulnerability has been resolved:\ncifs: Fix memory leak when build ntlmssp negotiate blob failed\nThere is a memory leak when mount cifs:\nunreferenced object 0xffff888166059600 (size 448):\ncomm \"mount.cifs\", pid 51391, jiffies 4295596373 (age 330.596s)\nhex dump (first 32 bytes):\nfe 53 4d 42 40 00 00 00 00 00 00 00 01 00 82 00  .SMB@...........\n00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................\nbacktrace:\n[<0000000060609a61>] mempool_alloc+0xe1/0x260\n[<00000000adfa6c63>] cifs_small_buf_get+0x24/0x60\n[<00000000ebb404c7>] __smb2_plain_req_init+0x32/0x460\n[<00000000bcf875b4>] SMB2_sess_alloc_buffer+0xa4/0x3f0\n[<00000000753a2987>] SMB2_sess_auth_rawntlmssp_negotiate+0xf5/0x480\n[<00000000f0c1f4f9>] SMB2_sess_setup+0x253/0x410\n[<00000000a8b83303>] cifs_setup_session+0x18f/0x4c0\n[<00000000854bd16d>] cifs_get_smb_ses+0xae7/0x13c0\n[<000000006cbc43d9>] mount_get_conns+0x7a/0x730\n[<000000005922d816>] cifs_mount+0x103/0xd10\n[<00000000e33def3b>] cifs_smb3_do_mount+0x1dd/0xc90\n[<0000000078034979>] smb3_get_tree+0x1d5/0x300\n[<000000004371f980>] vfs_get_tree+0x41/0xf0\n[<00000000b670d8a7>] path_mount+0x9b3/0xdd0\n[<000000005e839a7d>] __x64_sys_mount+0x190/0x1d0\n[<000000009404c3b9>] do_syscall_64+0x35/0x80\nWhen build ntlmssp negotiate blob failed, the session setup request\nshould be freed." ],
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2024-08-08T00:00:00Z",
    "advisory" : "RHSA-2024:5101",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8",
    "package" : "kernel-0:4.18.0-553.16.1.el8_10"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2023-11-07T00:00:00Z",
    "advisory" : "RHSA-2023:6583",
    "cpe" : "cpe:/a:redhat:enterprise_linux:9",
    "package" : "kernel-0:5.14.0-362.8.1.el9_3"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2023-11-07T00:00:00Z",
    "advisory" : "RHSA-2023:6583",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9",
    "package" : "kernel-0:5.14.0-362.8.1.el9_3"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 10",
    "fix_state" : "Not affected",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:10"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Not affected",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Not affected",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Not affected",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Fix deferred",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "fix_state" : "Fix deferred",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2022-50372\nhttps://nvd.nist.gov/vuln/detail/CVE-2022-50372\nhttps://lore.kernel.org/linux-cve-announce/2025091717-CVE-2022-50372-e3b5@gregkh/T" ],
  "name" : "CVE-2022-50372",
  "csaw" : false
}