-
CVE-2022-50422
- EPSS 0.03%
- Veröffentlicht 01.10.2025 12:15:33
- Zuletzt bearbeitet 02.10.2025 19:12:17
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- Teams Watchlist Login
- Unerledigt Login
In the Linux kernel, the following vulnerability has been resolved: scsi: libsas: Fix use-after-free bug in smp_execute_task_sg() When executing SMP task failed, the smp_execute_task_sg() calls del_timer() to delete "slow_task->timer". However, if the timer handler sas_task_internal_timedout() is running, the del_timer() in smp_execute_task_sg() will not stop it and a UAF will happen. The process is shown below: (thread 1) | (thread 2) smp_execute_task_sg() | sas_task_internal_timedout() ... | del_timer() | ... | ... sas_free_task(task) | kfree(task->slow_task) //FREE| | task->slow_task->... //USE Fix by calling del_timer_sync() in smp_execute_task_sg(), which makes sure the timer handler have finished before the "task->slow_task" is deallocated.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
117331a2a5227fb4369c2a1f321d3e3e2e2ef8fe
Version
2908d778ab3e244900c310974e1fc1c69066e450
Status
affected
Version <
a9e5176ead6de64f572ad5c87a72825d9d3c82ae
Version
2908d778ab3e244900c310974e1fc1c69066e450
Status
affected
Version <
e45a1516d2933703a4823d9db71e17c3abeba24f
Version
2908d778ab3e244900c310974e1fc1c69066e450
Status
affected
Version <
f7a785177611ffc97d645fcbc196e6de6ad2421d
Version
2908d778ab3e244900c310974e1fc1c69066e450
Status
affected
Version <
2e12ce270f0d926085c1209cc90397e307deef97
Version
2908d778ab3e244900c310974e1fc1c69066e450
Status
affected
Version <
46ba53c30666717cb06c2b3c5d896301cd00d0c0
Version
2908d778ab3e244900c310974e1fc1c69066e450
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
2.6.19
Status
affected
Version <
2.6.19
Version
0
Status
unaffected
Version <=
5.4.*
Version
5.4.220
Status
unaffected
Version <=
5.10.*
Version
5.10.150
Status
unaffected
Version <=
5.15.*
Version
5.15.75
Status
unaffected
Version <=
5.19.*
Version
5.19.17
Status
unaffected
Version <=
6.0.*
Version
6.0.3
Status
unaffected
Version <=
*
Version
6.1
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.03% | 0.081 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|