CVE-2022-50072

In the Linux kernel, the following vulnerability has been resolved: NFSv4/pnfs: Fix a use-after-free bug in open If someone cancels the open RPC call, then we must not try to free either the open slot or the layoutget operation arguments, since they are likely still in use by the hung RPC call.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

17 Nov 2025, 18:00

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CWE CWE-416
First Time Linux
Linux linux Kernel
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: NFSv4/pnfs: corrige un error de Use-After-Free en open Si alguien cancela la llamada RPC open, entonces no debemos intentar liberar ni la ranura abierta ni los argumentos de la operación layoutget, ya que es probable que aún estén en uso por la llamada RPC colgada.
References () https://git.kernel.org/stable/c/0fffb46ff3d5ed4668aca96441ec7a25b793bd6f - () https://git.kernel.org/stable/c/0fffb46ff3d5ed4668aca96441ec7a25b793bd6f - Patch
References () https://git.kernel.org/stable/c/2135e5d56278ffdb1c2e6d325dc6b87f669b9dac - () https://git.kernel.org/stable/c/2135e5d56278ffdb1c2e6d325dc6b87f669b9dac - Patch
References () https://git.kernel.org/stable/c/76ffd2042438769298f34b76102b40dea89de616 - () https://git.kernel.org/stable/c/76ffd2042438769298f34b76102b40dea89de616 - Patch
References () https://git.kernel.org/stable/c/a4cf3dadd1fa43609f7c6570c9116b0e0a9923d1 - () https://git.kernel.org/stable/c/a4cf3dadd1fa43609f7c6570c9116b0e0a9923d1 - Patch
References () https://git.kernel.org/stable/c/b03d1117e9be7c7da60e466eaf9beed85c5916c8 - () https://git.kernel.org/stable/c/b03d1117e9be7c7da60e466eaf9beed85c5916c8 - Patch
References () https://git.kernel.org/stable/c/f7ee3b772d9de87387a725caa04bc041ac7fe5ec - () https://git.kernel.org/stable/c/f7ee3b772d9de87387a725caa04bc041ac7fe5ec - Patch

18 Jun 2025, 11:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-18 11:15

Updated : 2025-11-17 18:00


NVD link : CVE-2022-50072

Mitre link : CVE-2022-50072

CVE.ORG link : CVE-2022-50072


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free