CVE-2022-50725
Use-After-Free in Linux vidtv Bridge DVB Initialization
Publication date: 2025-12-24
Last updated on: 2025-12-24
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| vidtv | vidtv_bridge | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a use-after-free bug in the Linux kernel's vidtv_bridge_dvb_init() function. The error handling in this function is incorrect, causing it to release memory twice. Specifically, vidtv_bridge_dmx(dev)_init() cleans up on failure, but the subsequent goto fail_dmx(_dev) calls release functions again, leading to use-after-free. Additionally, there are issues with loop bounds and releasing resources in other failure paths, although these do not currently cause problems due to the loop size. The fix involves correctly releasing all resources to prevent use-after-free.
How can this vulnerability impact me? :
This use-after-free vulnerability can lead to undefined behavior such as system crashes, memory corruption, or potential escalation of privileges if exploited. It affects the stability and security of the Linux kernel's media subsystem, potentially allowing attackers to execute arbitrary code or cause denial of service.