CVE-2022-50288

Severity CVSS v4.0:
Pending analysis
Type:
CWE-416 Use After Free
Publication date:
15/09/2025
Last modified:
03/12/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> qlcnic: prevent -&gt;dcb use-after-free on qlcnic_dcb_enable() failure<br /> <br /> adapter-&gt;dcb would get silently freed inside qlcnic_dcb_enable() in<br /> case qlcnic_dcb_attach() would return an error, which always happens<br /> under OOM conditions. This would lead to use-after-free because both<br /> of the existing callers invoke qlcnic_dcb_get_info() on the obtained<br /> pointer, which is potentially freed at that point.<br /> <br /> Propagate errors from qlcnic_dcb_enable(), and instead free the dcb<br /> pointer at callsite using qlcnic_dcb_free(). This also removes the now<br /> unused qlcnic_clear_dcb_ops() helper, which was a simple wrapper around<br /> kfree() also causing memory leaks for partially initialized dcb.<br /> <br /> Found by Linux Verification Center (linuxtesting.org) with the SVACE<br /> static analysis tool.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 3.14 (including) 4.14.303 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.15 (including) 4.19.270 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.20 (including) 5.4.229 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.5 (including) 5.10.163 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.87 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 6.0.19 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.1 (including) 6.1.5 (excluding)
cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*