In the Linux kernel, the following vulnerability has been resolved:
NFSv4/pnfs: Fix a use-after-free bug in open
If someone cancels the open RPC call, then we must not try to free
either the open slot or the layoutget operation arguments, since they
are likely still in use by the hung RPC call.
References
Configurations
Configuration 1 (hide)
|
History
17 Nov 2025, 18:00
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
| CWE | CWE-416 | |
| First Time |
Linux linux Kernel
Linux |
|
| References | () https://git.kernel.org/stable/c/0fffb46ff3d5ed4668aca96441ec7a25b793bd6f - Patch | |
| References | () https://git.kernel.org/stable/c/2135e5d56278ffdb1c2e6d325dc6b87f669b9dac - Patch | |
| References | () https://git.kernel.org/stable/c/76ffd2042438769298f34b76102b40dea89de616 - Patch | |
| References | () https://git.kernel.org/stable/c/a4cf3dadd1fa43609f7c6570c9116b0e0a9923d1 - Patch | |
| References | () https://git.kernel.org/stable/c/b03d1117e9be7c7da60e466eaf9beed85c5916c8 - Patch | |
| References | () https://git.kernel.org/stable/c/f7ee3b772d9de87387a725caa04bc041ac7fe5ec - Patch |
Information
Published : 2025-06-18 11:15
Updated : 2025-11-17 18:00
NVD link : CVE-2022-50072
Mitre link : CVE-2022-50072
CVE.ORG link : CVE-2022-50072
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free
