[<prev] [next>] [day] [month] [year] [list]
Message-ID: <2025061835-CVE-2022-50022-98b6@gregkh>
Date: Wed, 18 Jun 2025 13:01:27 +0200
From: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To: linux-cve-announce@...r.kernel.org
Cc: Greg Kroah-Hartman <gregkh@...nel.org>
Subject: CVE-2022-50022: drivers:md:fix a potential use-after-free bug
From: Greg Kroah-Hartman <gregkh@...nel.org>
Description
===========
In the Linux kernel, the following vulnerability has been resolved:
drivers:md:fix a potential use-after-free bug
In line 2884, "raid5_release_stripe(sh);" drops the reference to sh and
may cause sh to be released. However, sh is subsequently used in lines
2886 "if (sh->batch_head && sh != sh->batch_head)". This may result in an
use-after-free bug.
It can be fixed by moving "raid5_release_stripe(sh);" to the bottom of
the function.
The Linux kernel CVE team has assigned CVE-2022-50022 to this issue.
Affected and fixed versions
===========================
Fixed in 4.9.326 with commit 7470a4314b239e9a9580f248fdf4c9a92805490e
Fixed in 4.14.291 with commit 09cf99bace7789d91caa8d10fbcfc8b2fb35857f
Fixed in 4.19.256 with commit e5b3dd2d92c4511e81f6e4ec9c5bb7ad25e03d13
Fixed in 5.4.211 with commit f5d46f1b47f65da1faf468277b261eb78c8e25b5
Fixed in 5.10.138 with commit 5d8325fd15892c8ab1146edc1d7ed8463de39636
Fixed in 5.15.63 with commit d9b94c3ace549433de8a93eeb27b0391fc8ac406
Fixed in 5.19.4 with commit eb3a4f73f43f839df981dda5859e8e075067a360
Fixed in 6.0 with commit 104212471b1c1817b311771d817fb692af983173
Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
older supported kernel versions. The official CVE entry at
https://cve.org/CVERecord/?id=CVE-2022-50022
will be updated if fixes are backported, please check that for the most
up to date information about this issue.
Affected files
==============
The file(s) affected by this issue are:
drivers/md/raid5.c
Mitigation
==========
The Linux kernel CVE team recommends that you update to the latest
stable kernel version for this, and many other bugfixes. Individual
changes are never tested alone, but rather are part of a larger kernel
release. Cherry-picking individual commits is not recommended or
supported by the Linux kernel community at all. If however, updating to
the latest release is impossible, the individual changes to resolve this
issue can be found at these commits:
https://git.kernel.org/stable/c/7470a4314b239e9a9580f248fdf4c9a92805490e
https://git.kernel.org/stable/c/09cf99bace7789d91caa8d10fbcfc8b2fb35857f
https://git.kernel.org/stable/c/e5b3dd2d92c4511e81f6e4ec9c5bb7ad25e03d13
https://git.kernel.org/stable/c/f5d46f1b47f65da1faf468277b261eb78c8e25b5
https://git.kernel.org/stable/c/5d8325fd15892c8ab1146edc1d7ed8463de39636
https://git.kernel.org/stable/c/d9b94c3ace549433de8a93eeb27b0391fc8ac406
https://git.kernel.org/stable/c/eb3a4f73f43f839df981dda5859e8e075067a360
https://git.kernel.org/stable/c/104212471b1c1817b311771d817fb692af983173
Powered by blists - more mailing lists