CVE-2022-50329Use After Free in Linux

Severity
7.8HIGHNVD
EPSS
0.0%
top 95.67%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 15

Description

In the Linux kernel, the following vulnerability has been resolved: block, bfq: fix uaf for bfqq in bfq_exit_icq_bfqq Commit 64dc8c732f5c ("block, bfq: fix possible uaf for 'bfqq->bic'") will access 'bic->bfqq' in bic_set_bfqq(), however, bfq_exit_icq_bfqq() can free bfqq first, and then call bic_set_bfqq(), which will cause uaf. Fix the problem by moving bfq_exit_bfqq() behind bic_set_bfqq().

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages4 packages

Debianlinux/linux_kernel< 5.10.178-1+3
NVDlinux/linux_kernel4 versions+3
CVEListV5linux/linux5533742c7cb1bc9b1f0bf401cc397d44a3a9e07a1425f1bb5df5239021fd09ebc2a5e8070e705d36+7
debiandebian/linux< linux 6.1.4-1 (bookworm)

Patches

🔴Vulnerability Details

2
OSV
CVE-2022-50329: In the Linux kernel, the following vulnerability has been resolved: block, bfq: fix uaf for bfqq in bfq_exit_icq_bfqq Commit 64dc8c732f5c ("block, bfq2025-09-15
GHSA
GHSA-mmqv-h65v-7p4p: In the Linux kernel, the following vulnerability has been resolved: block, bfq: fix uaf for bfqq in bfq_exit_icq_bfqq Commit 64dc8c732f5c ("block, b2025-09-15

📋Vendor Advisories

3
Red Hat
kernel: Linux kernel: Denial of Service due to use-after-free in BFQ scheduler2025-09-15
Ivanti
Ivanti Security Advisory: CVE-2024-503292024-11-12
Debian
CVE-2022-50329: linux - In the Linux kernel, the following vulnerability has been resolved: block, bfq:...2022
CVE-2022-50329 — Use After Free in Linux | cvebase