CVE-2022-50697

Source
https://cve.org/CVERecord?id=CVE-2022-50697
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50697.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-50697
Downstream
Related
Published
2025-12-24T10:55:13.762Z
Modified
2026-03-28T08:59:08.615992786Z
Summary
mrp: introduce active flags to prevent UAF when applicant uninit
Details

In the Linux kernel, the following vulnerability has been resolved:

mrp: introduce active flags to prevent UAF when applicant uninit

The caller of deltimersync must prevent restarting of the timer, If we have no this synchronization, there is a small probability that the cancellation will not be successful.

And syzbot report the fellowing crash:

BUG: KASAN: use-after-free in hlistaddhead include/linux/list.h:929 [inline] BUG: KASAN: use-after-free in enqueue_timer+0x18/0xa4 kernel/time/timer.c:605 Write at addr f9ff000024df6058 by task syz-fuzzer/2256 Pointer tag: [f9], memory tag: [fe]

CPU: 1 PID: 2256 Comm: syz-fuzzer Not tainted 6.1.0-rc5-syzkaller-00008- ge01d50cbd6ee #0 Hardware name: linux,dummy-virt (DT) Call trace: dumpbacktrace.part.0+0xe0/0xf0 arch/arm64/kernel/stacktrace.c:156 dumpbacktrace arch/arm64/kernel/stacktrace.c:162 [inline] show_stack+0x18/0x40 arch/arm64/kernel/stacktrace.c:163 __dumpstack lib/dumpstack.c:88 [inline] dumpstacklvl+0x68/0x84 lib/dumpstack.c:106 printaddressdescription mm/kasan/report.c:284 [inline] printreport+0x1a8/0x4a0 mm/kasan/report.c:395 kasan_report+0x94/0xb4 mm/kasan/report.c:495 _dokernelfault+0x164/0x1e0 arch/arm64/mm/fault.c:320 dobadarea arch/arm64/mm/fault.c:473 [inline] dotagcheckfault+0x78/0x8c arch/arm64/mm/fault.c:749 domemabort+0x44/0x94 arch/arm64/mm/fault.c:825 el1abort+0x40/0x60 arch/arm64/kernel/entry-common.c:367 el1h64synchandler+0xd8/0xe4 arch/arm64/kernel/entry-common.c:427 el1h64sync+0x64/0x68 arch/arm64/kernel/entry.S:576 hlistaddhead include/linux/list.h:929 [inline] enqueuetimer+0x18/0xa4 kernel/time/timer.c:605 modtimer+0x14/0x20 kernel/time/timer.c:1161 mrpperiodictimerarm net/802/mrp.c:614 [inline] mrpperiodictimer+0xa0/0xc0 net/802/mrp.c:627 calltimerfn.constprop.0+0x24/0x80 kernel/time/timer.c:1474 expiretimers+0x98/0xc4 kernel/time/timer.c:1519

To fix it, we can introduce a new active flags to make sure the timer will not restart.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50697.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
febf018d22347b5df94066bca05d0c11a84e839d
Fixed
98f53e591940e4c3818be358c5dc684d5b30cb56
Fixed
aacffc1a8dbf67c5463cb4f67b37143c01ca6fa9
Fixed
78d48bc41f7726113c9f114268d3ab11212814da
Fixed
aadb1507a77b060c529edfeaf67f803e31461f24
Fixed
755eb0879224ffc2a43de724554aeaf0e51e5a64
Fixed
5d5a481a7fd0234f617535dc464ea010804a1129
Fixed
1a185fe83c2a60c1e3596fb9d82dbeb148dc09c6
Fixed
563e45fd5046045cc194af3ba17f5423e1c98170
Fixed
ab0377803dafc58f1e22296708c1c28e309414d6

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50697.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
3.9.0
Fixed
4.9.337
Type
ECOSYSTEM
Events
Introduced
4.10.0
Fixed
4.14.303
Type
ECOSYSTEM
Events
Introduced
4.15.0
Fixed
4.19.270
Type
ECOSYSTEM
Events
Introduced
4.20.0
Fixed
5.4.229
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.163
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.86
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.0.16
Type
ECOSYSTEM
Events
Introduced
6.1.0
Fixed
6.1.2

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50697.json"