CVE-2022-50022

Source
https://cve.org/CVERecord?id=CVE-2022-50022
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50022.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-50022
Downstream
Related
Published
2025-06-18T11:01:25.965Z
Modified
2026-03-20T12:22:32.069272Z
Summary
drivers:md:fix a potential use-after-free bug
Details

In the Linux kernel, the following vulnerability has been resolved:

drivers:md:fix a potential use-after-free bug

In line 2884, "raid5releasestripe(sh);" drops the reference to sh and may cause sh to be released. However, sh is subsequently used in lines 2886 "if (sh->batchhead && sh != sh->batchhead)". This may result in an use-after-free bug.

It can be fixed by moving "raid5releasestripe(sh);" to the bottom of the function.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50022.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
59fc630b8b5f9f21c8ce3ba153341c107dce1b0c
Fixed
7470a4314b239e9a9580f248fdf4c9a92805490e
Fixed
09cf99bace7789d91caa8d10fbcfc8b2fb35857f
Fixed
e5b3dd2d92c4511e81f6e4ec9c5bb7ad25e03d13
Fixed
f5d46f1b47f65da1faf468277b261eb78c8e25b5
Fixed
5d8325fd15892c8ab1146edc1d7ed8463de39636
Fixed
d9b94c3ace549433de8a93eeb27b0391fc8ac406
Fixed
eb3a4f73f43f839df981dda5859e8e075067a360
Fixed
104212471b1c1817b311771d817fb692af983173

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50022.json"