-

CVE-2022-50422

In the Linux kernel, the following vulnerability has been resolved:

scsi: libsas: Fix use-after-free bug in smp_execute_task_sg()

When executing SMP task failed, the smp_execute_task_sg() calls del_timer()
to delete "slow_task->timer". However, if the timer handler
sas_task_internal_timedout() is running, the del_timer() in
smp_execute_task_sg() will not stop it and a UAF will happen. The process
is shown below:

      (thread 1)               |        (thread 2)
smp_execute_task_sg()          | sas_task_internal_timedout()
 ...                           |
 del_timer()                   |
 ...                           |  ...
 sas_free_task(task)           |
  kfree(task->slow_task) //FREE|
                               |  task->slow_task->... //USE

Fix by calling del_timer_sync() in smp_execute_task_sg(), which makes sure
the timer handler have finished before the "task->slow_task" is
deallocated.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < 117331a2a5227fb4369c2a1f321d3e3e2e2ef8fe
Version 2908d778ab3e244900c310974e1fc1c69066e450
Status affected
Version < a9e5176ead6de64f572ad5c87a72825d9d3c82ae
Version 2908d778ab3e244900c310974e1fc1c69066e450
Status affected
Version < e45a1516d2933703a4823d9db71e17c3abeba24f
Version 2908d778ab3e244900c310974e1fc1c69066e450
Status affected
Version < f7a785177611ffc97d645fcbc196e6de6ad2421d
Version 2908d778ab3e244900c310974e1fc1c69066e450
Status affected
Version < 2e12ce270f0d926085c1209cc90397e307deef97
Version 2908d778ab3e244900c310974e1fc1c69066e450
Status affected
Version < 46ba53c30666717cb06c2b3c5d896301cd00d0c0
Version 2908d778ab3e244900c310974e1fc1c69066e450
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 2.6.19
Status affected
Version < 2.6.19
Version 0
Status unaffected
Version <= 5.4.*
Version 5.4.220
Status unaffected
Version <= 5.10.*
Version 5.10.150
Status unaffected
Version <= 5.15.*
Version 5.15.75
Status unaffected
Version <= 5.19.*
Version 5.19.17
Status unaffected
Version <= 6.0.*
Version 6.0.3
Status unaffected
Version <= *
Version 6.1
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.03% 0.081
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String