CVE-2022-50384Use After Free in Linux

CWE-416Use After Free5 documents5 sources
Severity
7.8HIGHNVD
EPSS
0.0%
top 96.11%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 18

Description

In the Linux kernel, the following vulnerability has been resolved: staging: vme_user: Fix possible UAF in tsi148_dma_list_add Smatch report warning as follows: drivers/staging/vme_user/vme_tsi148.c:1757 tsi148_dma_list_add() warn: '&entry->list' not removed from list In tsi148_dma_list_add(), the error path "goto err_dma" will not remove entry->list from list->entries, but entry will be freed, then list traversal may cause UAF. Fix by removeing it from list->entries before free().

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages4 packages

NVDlinux/linux_kernel4.24.9.337+7
Debianlinux/linux_kernel< 5.10.178-1+3
CVEListV5linux/linuxb2383c90a9d691201b9aee557776694cde86a9355cc4eea715a3fcf4e516662f736dfee63979465f+9
debiandebian/linux< linux 6.1.4-1 (bookworm)

Patches

🔴Vulnerability Details

2
OSV
CVE-2022-50384: In the Linux kernel, the following vulnerability has been resolved: staging: vme_user: Fix possible UAF in tsi148_dma_list_add Smatch report warning a2025-09-18
GHSA
GHSA-8j88-p9vm-9wrx: In the Linux kernel, the following vulnerability has been resolved: staging: vme_user: Fix possible UAF in tsi148_dma_list_add Smatch report warning2025-09-18

📋Vendor Advisories

2
Red Hat
kernel: staging: vme_user: Fix possible UAF in tsi148_dma_list_add2025-09-18
Debian
CVE-2022-50384: linux - In the Linux kernel, the following vulnerability has been resolved: staging: vm...2022
CVE-2022-50384 — Use After Free in Linux | cvebase