CVE-2022-50243
BaseFortify
Publication date: 2025-09-15
Last updated on: 2025-11-24
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | 5.14 |
| linux | linux_kernel | 5.14 |
| linux | linux_kernel | 5.14 |
| linux | linux_kernel | 5.14 |
| linux | linux_kernel | 5.14 |
| linux | linux_kernel | 5.14 |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-416 | The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory "belongs" to the code that operates on the new pointer. |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :
This vulnerability can lead to use-after-free memory corruption in the Linux kernel when sending SCTP packets. This may cause system instability, crashes, or potentially allow an attacker to execute arbitrary code or cause denial of service by exploiting the memory corruption.
Can you explain this vulnerability to me?
This vulnerability is a use-after-free issue in the Linux kernel's SCTP (Stream Control Transmission Protocol) implementation. When the function sctp_auth_asoc_init_active_key() returns an error, the active key is not updated properly. However, the old shared key (sh_key) is freed while it is still in use as the active key in the association (asoc). This leads to a use-after-free condition when sending packets, potentially causing memory corruption or crashes. The patch fixes this by ensuring the shared key is not replaced if an error occurs, and the old active_key_id is restored to prevent the use-after-free.