CVE-2022-50310Use After Free in Linux

CWE-416Use After Free5 documents5 sources
Severity
7.8HIGHNVD
EPSS
0.0%
top 94.20%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 15

Description

In the Linux kernel, the following vulnerability has been resolved: ip6mr: fix UAF issue in ip6mr_sk_done() when addrconf_init_net() failed If the initialization fails in calling addrconf_init_net(), devconf_all is the pointer that has been released. Then ip6mr_sk_done() is called to release the net, accessing devconf->mc_forwarding directly causes invalid pointer access. The process is as follows: setup_net() ops_init() addrconf_init_net() all = kmemdup(...) ---> alloc "all" ... net->ipv6.de

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages4 packages

NVDlinux/linux_kernel5.186.0.6+1
Debianlinux/linux_kernel< 6.0.6-1+2
CVEListV5linux/linux7d9b1b578d67a14ae7a7a526ee115b233fa264c422a68c3b9362eaac7b035eba09e95e6b3f7a912c+2
debiandebian/linux< linux 6.0.6-1 (bookworm)

Patches

🔴Vulnerability Details

2
OSV
CVE-2022-50310: In the Linux kernel, the following vulnerability has been resolved: ip6mr: fix UAF issue in ip6mr_sk_done() when addrconf_init_net() failed If the ini2025-09-15
GHSA
GHSA-5gwp-j3j8-5v64: In the Linux kernel, the following vulnerability has been resolved: ip6mr: fix UAF issue in ip6mr_sk_done() when addrconf_init_net() failed If the i2025-09-15

📋Vendor Advisories

2
Red Hat
kernel: ip6mr: fix UAF issue in ip6mr_sk_done() when addrconf_init_net() failed2025-09-15
Debian
CVE-2022-50310: linux - In the Linux kernel, the following vulnerability has been resolved: ip6mr: fix ...2022
CVE-2022-50310 — Use After Free in Linux | cvebase