SB2025100477 - Use-after-free in Linux kernel md driver
Published: October 4, 2025 Updated: October 27, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Use-after-free (CVE-ID: CVE-2022-50496)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the destroy() function in drivers/md/dm-cache-target.c. A local user can escalate privileges on the system.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/034cbc8d3b47a56acd89453c29632a9c117de09d
- https://git.kernel.org/stable/c/2b17026685a270b2beaf1cdd9857fcedd3505c7e
- https://git.kernel.org/stable/c/2f097dfac7579fd84ff98eb1d3acd41d53a485f3
- https://git.kernel.org/stable/c/4d20032dd90664de09f2902a7ea49ae2f7771746
- https://git.kernel.org/stable/c/6a3e412c2ab131c54945327a7676b006f000a209
- https://git.kernel.org/stable/c/6a459d8edbdbe7b24db42a5a9f21e6aa9e00c2aa
- https://git.kernel.org/stable/c/6ac4f36910764cb510bafc4c3768544f86ca48ca
- https://git.kernel.org/stable/c/993406104d2b28fe470126a062ad37a1e21e792e
- https://git.kernel.org/stable/c/d2a0b298ebf83ab6236f66788a3541e91ce75a70
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.87