CVE-2022-50022

In the Linux kernel, the following vulnerability has been resolved: drivers:md:fix a potential use-after-free bug In line 2884, "raid5_release_stripe(sh);" drops the reference to sh and may cause sh to be released. However, sh is subsequently used in lines 2886 "if (sh->batch_head && sh != sh->batch_head)". This may result in an use-after-free bug. It can be fixed by moving "raid5_release_stripe(sh);" to the bottom of the function.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

13 Nov 2025, 19:46

Type Values Removed Values Added
First Time Linux linux Kernel
Linux
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
References () https://git.kernel.org/stable/c/09cf99bace7789d91caa8d10fbcfc8b2fb35857f - () https://git.kernel.org/stable/c/09cf99bace7789d91caa8d10fbcfc8b2fb35857f - Patch
References () https://git.kernel.org/stable/c/104212471b1c1817b311771d817fb692af983173 - () https://git.kernel.org/stable/c/104212471b1c1817b311771d817fb692af983173 - Patch
References () https://git.kernel.org/stable/c/5d8325fd15892c8ab1146edc1d7ed8463de39636 - () https://git.kernel.org/stable/c/5d8325fd15892c8ab1146edc1d7ed8463de39636 - Patch
References () https://git.kernel.org/stable/c/7470a4314b239e9a9580f248fdf4c9a92805490e - () https://git.kernel.org/stable/c/7470a4314b239e9a9580f248fdf4c9a92805490e - Patch
References () https://git.kernel.org/stable/c/d9b94c3ace549433de8a93eeb27b0391fc8ac406 - () https://git.kernel.org/stable/c/d9b94c3ace549433de8a93eeb27b0391fc8ac406 - Patch
References () https://git.kernel.org/stable/c/e5b3dd2d92c4511e81f6e4ec9c5bb7ad25e03d13 - () https://git.kernel.org/stable/c/e5b3dd2d92c4511e81f6e4ec9c5bb7ad25e03d13 - Patch
References () https://git.kernel.org/stable/c/eb3a4f73f43f839df981dda5859e8e075067a360 - () https://git.kernel.org/stable/c/eb3a4f73f43f839df981dda5859e8e075067a360 - Patch
References () https://git.kernel.org/stable/c/f5d46f1b47f65da1faf468277b261eb78c8e25b5 - () https://git.kernel.org/stable/c/f5d46f1b47f65da1faf468277b261eb78c8e25b5 - Patch
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE CWE-416

Information

Published : 2025-06-18 11:15

Updated : 2025-11-13 19:46


NVD link : CVE-2022-50022

Mitre link : CVE-2022-50022

CVE.ORG link : CVE-2022-50022


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free