CVE-2022-50563 — Use After Free in Linux
Severity
4.4MEDIUM
No vectorEPSS
0.1%
top 80.97%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedOct 22
Description
In the Linux kernel, the following vulnerability has been resolved:
dm thin: Fix UAF in run_timer_softirq()
When dm_resume() and dm_destroy() are concurrent, it will
lead to UAF, as follows:
BUG: KASAN: use-after-free in __run_timers+0x173/0x710
Write of size 8 at addr ffff88816d9490f0 by task swapper/0/0
Call Trace:
dump_stack_lvl+0x73/0x9f
print_report.cold+0x132/0xaa2
_raw_spin_lock_irqsave+0xcd/0x160
__run_timers+0x173/0x710
kasan_report+0xad/0x110
__run_timers+0x173/0x710
__asan_store8…
Affected Packages4 packages
▶CVEListV5linux/linux991d9fa02da0dd1f843dc011376965e0c8c6c9b5 — 7ee059d06a5d3c15465959e0472993e80fbe4e81+9
🔴Vulnerability Details
3GHSA▶
GHSA-9g9c-838j-m3cg: In the Linux kernel, the following vulnerability has been resolved:
dm thin: Fix UAF in run_timer_softirq()
When dm_resume() and dm_destroy() are co↗2025-10-22
OSV▶
CVE-2022-50563: In the Linux kernel, the following vulnerability has been resolved: dm thin: Fix UAF in run_timer_softirq() When dm_resume() and dm_destroy() are conc↗2025-10-22