CVE-2022-50542Use After Free in Linux

Severity
7.8HIGHNVD
EPSS
0.0%
top 97.34%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 7

Description

In the Linux kernel, the following vulnerability has been resolved: media: si470x: Fix use-after-free in si470x_int_in_callback() syzbot reported use-after-free in si470x_int_in_callback() [1]. This indicates that urb->context, which contains struct si470x_device object, is freed when si470x_int_in_callback() is called. The cause of this issue is that si470x_int_in_callback() is called for freed urb. si470x_usb_driver_probe() calls si470x_start_usb(), which then calls usb_submit_urb() and si

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages4 packages

NVDlinux/linux_kernel3.64.9.337+7
Debianlinux/linux_kernel< 5.10.178-1+3
CVEListV5linux/linux779471110c6f0f7f7c223fc696170ec750ac3531146bd005ebb01ae190c22af050cb98623958c373+9
debiandebian/linux< linux 6.1.4-1 (bookworm)

Patches

🔴Vulnerability Details

2
OSV
CVE-2022-50542: In the Linux kernel, the following vulnerability has been resolved: media: si470x: Fix use-after-free in si470x_int_in_callback() syzbot reported use-2025-10-07
GHSA
GHSA-6wcc-3gxf-38rg: In the Linux kernel, the following vulnerability has been resolved: media: si470x: Fix use-after-free in si470x_int_in_callback() syzbot reported us2025-10-07

📋Vendor Advisories

2
Red Hat
kernel: media: si470x: Fix use-after-free in si470x_int_in_callback()2025-10-07
Debian
CVE-2022-50542: linux - In the Linux kernel, the following vulnerability has been resolved: media: si47...2022