CVE-2022-50421Use After Free in Linux

Severity
7.8HIGHNVD
EPSS
0.0%
top 98.19%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 1

Description

In the Linux kernel, the following vulnerability has been resolved: rpmsg: char: Avoid double destroy of default endpoint The rpmsg_dev_remove() in rpmsg_core is the place for releasing this default endpoint. So need to avoid destroying the default endpoint in rpmsg_chrdev_eptdev_destroy(), this should be the same as rpmsg_eptdev_release(). Otherwise there will be double destroy issue that ept->refcount report warning: refcount_t: underflow; use-after-free. Call trace: refcount_warn_saturat

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages4 packages

NVDlinux/linux_kernel5.185.19.17+1
Debianlinux/linux_kernel< 6.0.3-1+2
CVEListV5linux/linuxbea9b79c2d10fecf7bfa26e212ecefe61d232e39ef828a39d6a7028836eaf37df3ad568c8c2dd6f9+3
debiandebian/linux< linux 6.0.3-1 (bookworm)

Patches

🔴Vulnerability Details

2
GHSA
GHSA-7gv2-7hhr-4fm9: In the Linux kernel, the following vulnerability has been resolved: rpmsg: char: Avoid double destroy of default endpoint The rpmsg_dev_remove() in2025-10-01
OSV
CVE-2022-50421: In the Linux kernel, the following vulnerability has been resolved: rpmsg: char: Avoid double destroy of default endpoint The rpmsg_dev_remove() in rp2025-10-01

📋Vendor Advisories

2
Red Hat
kernel: rpmsg: char: Avoid double destroy of default endpoint2025-10-01
Debian
CVE-2022-50421: linux - In the Linux kernel, the following vulnerability has been resolved: rpmsg: char...2022