CVE-2022-50034
Severity CVSS v4.0:
Pending analysis
Type:
CWE-416
Use After Free
Publication date:
18/06/2025
Last modified:
13/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
usb: cdns3 fix use-after-free at workaround 2<br />
<br />
BUG: KFENCE: use-after-free read in __list_del_entry_valid+0x10/0xac<br />
<br />
cdns3_wa2_remove_old_request()<br />
{<br />
...<br />
kfree(priv_req->request.buf);<br />
cdns3_gadget_ep_free_request(&priv_ep->endpoint, &priv_req->request);<br />
list_del_init(&priv_req->list);<br />
^^^ use after free<br />
...<br />
}<br />
<br />
cdns3_gadget_ep_free_request() free the space pointed by priv_req,<br />
but priv_req is used in the following list_del_init().<br />
<br />
This patch move list_del_init() before cdns3_gadget_ep_free_request().
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.3 (including) | 5.4.211 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.138 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.63 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 5.19.4 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/6d7ac60098b206d0472475b666cb09d556bec03d
- https://git.kernel.org/stable/c/6fd50446e7c9a98b4bcf96815f5c9602a16ea472
- https://git.kernel.org/stable/c/7d602f30149a117eea260208b1661bc404c21dfd
- https://git.kernel.org/stable/c/c3c1dbad3a2db32ecf371c97f2058491b8ba0f9a
- https://git.kernel.org/stable/c/e65d9b7147d7be3504893ca7dfb85286bda83d40



