CVE-2022-50022

In the Linux kernel, the following vulnerability has been resolved: drivers:md:fix a potential use-after-free bug In line 2884, "raid5_release_stripe(sh);" drops the reference to sh and may cause sh to be released. However, sh is subsequently used in lines 2886 "if (sh->batch_head && sh != sh->batch_head)". This may result in an use-after-free bug. It can be fixed by moving "raid5_release_stripe(sh);" to the bottom of the function.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

13 Nov 2025, 19:46

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux
Linux linux Kernel
CWE CWE-416
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drivers:md:fix, un posible error de use-after-free. En la línea 2884, "raid5_release_stripe(sh);" omite la referencia a sh y puede provocar su liberación. Sin embargo, sh se utiliza posteriormente en la línea 2886 "if (sh->batch_head && sh != sh->batch_head)". Esto puede provocar un error de use-after-free. Se puede corregir moviendo "raid5_release_stripe(sh);" al final de la función.
References () https://git.kernel.org/stable/c/09cf99bace7789d91caa8d10fbcfc8b2fb35857f - () https://git.kernel.org/stable/c/09cf99bace7789d91caa8d10fbcfc8b2fb35857f - Patch
References () https://git.kernel.org/stable/c/104212471b1c1817b311771d817fb692af983173 - () https://git.kernel.org/stable/c/104212471b1c1817b311771d817fb692af983173 - Patch
References () https://git.kernel.org/stable/c/5d8325fd15892c8ab1146edc1d7ed8463de39636 - () https://git.kernel.org/stable/c/5d8325fd15892c8ab1146edc1d7ed8463de39636 - Patch
References () https://git.kernel.org/stable/c/7470a4314b239e9a9580f248fdf4c9a92805490e - () https://git.kernel.org/stable/c/7470a4314b239e9a9580f248fdf4c9a92805490e - Patch
References () https://git.kernel.org/stable/c/d9b94c3ace549433de8a93eeb27b0391fc8ac406 - () https://git.kernel.org/stable/c/d9b94c3ace549433de8a93eeb27b0391fc8ac406 - Patch
References () https://git.kernel.org/stable/c/e5b3dd2d92c4511e81f6e4ec9c5bb7ad25e03d13 - () https://git.kernel.org/stable/c/e5b3dd2d92c4511e81f6e4ec9c5bb7ad25e03d13 - Patch
References () https://git.kernel.org/stable/c/eb3a4f73f43f839df981dda5859e8e075067a360 - () https://git.kernel.org/stable/c/eb3a4f73f43f839df981dda5859e8e075067a360 - Patch
References () https://git.kernel.org/stable/c/f5d46f1b47f65da1faf468277b261eb78c8e25b5 - () https://git.kernel.org/stable/c/f5d46f1b47f65da1faf468277b261eb78c8e25b5 - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8

18 Jun 2025, 11:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-18 11:15

Updated : 2025-11-13 19:46


NVD link : CVE-2022-50022

Mitre link : CVE-2022-50022

CVE.ORG link : CVE-2022-50022


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free