CVE-2022-50220
BaseFortify
Publication date: 2025-06-18
Last updated on: 2025-11-19
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-416 | The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory "belongs" to the code that operates on the new pointer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a use-after-free issue in the Linux kernel's usbnet driver. It occurs because the driver schedules work to handle link status changes, but due to a historical change in how the driver waits for this work to complete during device disconnect, the work may run after the network device has been freed. Specifically, if a link change interrupt happens just before disconnect, the driver schedules deferred work that eventually triggers a use-after-free by operating on an unregistered and freed network device.
How can this vulnerability impact me? :
This vulnerability can cause use-after-free conditions in the Linux kernel's USB Ethernet drivers, potentially leading to kernel crashes or undefined behavior. This could affect system stability and security, possibly allowing attackers to cause denial of service or other unintended effects by triggering link change interrupts at specific times.
What immediate steps should I take to mitigate this vulnerability?
Apply the updated Linux kernel patch that fixes the usbnet use-after-free vulnerability by restoring the wait for usbnet_deferred_kevent() completion in the ->ndo_stop() callback. This patch corrects the handling of deferred work on disconnect to prevent use-after-free conditions in affected USB Ethernet drivers.