CVE-2022-50840
Use-After-Free Vulnerability in Linux Kernel SCSI snic Driver
Publication date: 2025-12-30
Last updated on: 2025-12-30
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a use-after-free (UAF) issue in the Linux kernel's SCSI driver 'snic'. Specifically, if the function device_add() fails during the execution of snic_tgt_create(), the target object (tgt) is freed but its list entry is not removed from the target list. This can lead to list traversal accessing freed memory, causing potential instability or crashes.
How can this vulnerability impact me? :
The vulnerability can cause the Linux kernel to access freed memory, which may lead to system instability, crashes, or potential exploitation by attackers to execute arbitrary code or cause denial of service.
What immediate steps should I take to mitigate this vulnerability?
Apply the updated Linux kernel patch that fixes the use-after-free (UAF) issue in the snic_tgt_create() function by ensuring that the target is properly removed from the snic->disc.tgt_list before being freed. This prevents list traversal from causing UAF. Until patched, avoid using vulnerable kernel versions.