CVE-2022-50022

Updated: 2026-02-27 01:54:44.112644

Description:

In the Linux kernel, the following vulnerability has been resolved: drivers:md:fix a potential use-after-free bug In line 2884, "raid5_release_stripe(sh);" drops the reference to sh and may cause sh to be released. However, sh is subsequently used in lines 2886 "if (sh->batch_head && sh != sh->batch_head)". This may result in an use-after-free bug. It can be fixed by moving "raid5_release_stripe(sh);" to the bottom of the function.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x 0.0
CVSS Version 3.x HIGH 7.8

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

AlmaLinux 9.2 ESU kernel 5.14.0 7.8 HIGH Already Fixed 2025-09-16 00:43:36
CentOS 6 ELS kernel 2.6.32 7.8 HIGH Not Vulnerable 2025-09-09 15:27:18
CentOS 7 ELS kernel 3.10.0 7.8 HIGH Released CLSA-2025:1757967705 2025-09-30 05:35:34
CentOS 8.4 ELS kernel 4.18.0 7.8 HIGH Released CLSA-2025:1754553172 2025-08-08 02:00:29
CentOS 8.5 ELS kernel 4.18.0 7.8 HIGH Released CLSA-2025:1754553993 2025-08-08 02:00:30
CentOS Stream 8 ELS kernel 4.18.0 7.8 HIGH Already Fixed 2025-09-09 10:44:16
CloudLinux 7 ELS kernel 3.10.0 7.8 HIGH Ignored 2025-11-07 23:40:42 CloudLinux 6 and 7 support is limited and provided on demand. We strongly recommend upgrading to Clo...
Oracle Linux 6 ELS kernel 2.6.32 7.8 HIGH Not Vulnerable 2025-11-02 08:25:10
Oracle Linux 7 ELS kernel 3.10.0 7.8 HIGH Released CLSA-2025:1757698145 2025-09-12 19:24:52
Oracle Linux 7 ELS kernel-uek 5.4.17 7.8 HIGH Already Fixed 2025-12-18 20:33:55
Total: 14