-

CVE-2022-50422

In the Linux kernel, the following vulnerability has been resolved:

scsi: libsas: Fix use-after-free bug in smp_execute_task_sg()

When executing SMP task failed, the smp_execute_task_sg() calls del_timer()
to delete "slow_task->timer". However, if the timer handler
sas_task_internal_timedout() is running, the del_timer() in
smp_execute_task_sg() will not stop it and a UAF will happen. The process
is shown below:

      (thread 1)               |        (thread 2)
smp_execute_task_sg()          | sas_task_internal_timedout()
 ...                           |
 del_timer()                   |
 ...                           |  ...
 sas_free_task(task)           |
  kfree(task->slow_task) //FREE|
                               |  task->slow_task->... //USE

Fix by calling del_timer_sync() in smp_execute_task_sg(), which makes sure
the timer handler have finished before the "task->slow_task" is
deallocated.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < 117331a2a5227fb4369c2a1f321d3e3e2e2ef8fe
Version 2908d778ab3e244900c310974e1fc1c69066e450
Status affected
Version < a9e5176ead6de64f572ad5c87a72825d9d3c82ae
Version 2908d778ab3e244900c310974e1fc1c69066e450
Status affected
Version < e45a1516d2933703a4823d9db71e17c3abeba24f
Version 2908d778ab3e244900c310974e1fc1c69066e450
Status affected
Version < f7a785177611ffc97d645fcbc196e6de6ad2421d
Version 2908d778ab3e244900c310974e1fc1c69066e450
Status affected
Version < 2e12ce270f0d926085c1209cc90397e307deef97
Version 2908d778ab3e244900c310974e1fc1c69066e450
Status affected
Version < 46ba53c30666717cb06c2b3c5d896301cd00d0c0
Version 2908d778ab3e244900c310974e1fc1c69066e450
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 2.6.19
Status affected
Version < 2.6.19
Version 0
Status unaffected
Version <= 5.4.*
Version 5.4.220
Status unaffected
Version <= 5.10.*
Version 5.10.150
Status unaffected
Version <= 5.15.*
Version 5.15.75
Status unaffected
Version <= 5.19.*
Version 5.19.17
Status unaffected
Version <= 6.0.*
Version 6.0.3
Status unaffected
Version <= *
Version 6.1
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.03% 0.081
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string