CVE-2022-50726 — Use After Free in Linux
Severity
6.2MEDIUM
No vectorEPSS
0.0%
top 92.57%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 24
Description
In the Linux kernel, the following vulnerability has been resolved:
net/mlx5: Fix possible use-after-free in async command interface
mlx5_cmd_cleanup_async_ctx should return only after all its callback
handlers were completed. Before this patch, the below race between
mlx5_cmd_cleanup_async_ctx and mlx5_cmd_exec_cb_handler was possible and
lead to a use-after-free:
1. mlx5_cmd_cleanup_async_ctx is called while num_inflight is 2 (i.e.
elevated by 1, a single inflight callback).
2. mlx5_cmd_cle…
Affected Packages4 packages
▶CVEListV5linux/linuxe355477ed9e4f401e3931043df97325d38552d54 — 69dd3ad406c49aa69ce4852c15231ac56af8caf9+5
🔴Vulnerability Details
3GHSA▶
GHSA-gjhx-8fr4-rcc6: In the Linux kernel, the following vulnerability has been resolved:
net/mlx5: Fix possible use-after-free in async command interface
mlx5_cmd_cleanu↗2025-12-24
OSV▶
CVE-2022-50726: In the Linux kernel, the following vulnerability has been resolved: net/mlx5: Fix possible use-after-free in async command interface mlx5_cmd_cleanup_↗2025-12-24