In the Linux kernel, the following vulnerability has been resolved:
drivers:md:fix a potential use-after-free bug
In line 2884, "raid5_release_stripe(sh);" drops the reference to sh and
may cause sh to be released. However, sh is subsequently used in lines
2886 "if (sh->batch_head && sh != sh->batch_head)". This may result in an
use-after-free bug.
It can be fixed by moving "raid5_release_stripe(sh);" to the bottom of
the function.
References
Configurations
Configuration 1 (hide)
|
History
13 Nov 2025, 19:46
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
| First Time |
Linux
Linux linux Kernel |
|
| CWE | CWE-416 | |
| Summary |
|
|
| References | () https://git.kernel.org/stable/c/09cf99bace7789d91caa8d10fbcfc8b2fb35857f - Patch | |
| References | () https://git.kernel.org/stable/c/104212471b1c1817b311771d817fb692af983173 - Patch | |
| References | () https://git.kernel.org/stable/c/5d8325fd15892c8ab1146edc1d7ed8463de39636 - Patch | |
| References | () https://git.kernel.org/stable/c/7470a4314b239e9a9580f248fdf4c9a92805490e - Patch | |
| References | () https://git.kernel.org/stable/c/d9b94c3ace549433de8a93eeb27b0391fc8ac406 - Patch | |
| References | () https://git.kernel.org/stable/c/e5b3dd2d92c4511e81f6e4ec9c5bb7ad25e03d13 - Patch | |
| References | () https://git.kernel.org/stable/c/eb3a4f73f43f839df981dda5859e8e075067a360 - Patch | |
| References | () https://git.kernel.org/stable/c/f5d46f1b47f65da1faf468277b261eb78c8e25b5 - Patch | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
18 Jun 2025, 11:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-06-18 11:15
Updated : 2025-11-13 19:46
NVD link : CVE-2022-50022
Mitre link : CVE-2022-50022
CVE.ORG link : CVE-2022-50022
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free
