Use-after-free in Linux kernel - CVE-2022-50129

 

Use-after-free in Linux kernel - CVE-2022-50129

Published: June 20, 2025 / Updated: June 21, 2025


Vulnerability identifier: #VU111532
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2022-50129
CWE-ID: CWE-416
Exploitation vector: Local access
Exploit availability: No public exploit available
Vendor: Linux Foundation
Affected software:
Linux kernel

Detailed vulnerability description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the srpt_refresh_port(), srpt_cm_req_recv(), srpt_release_sport(), __srpt_lookup_wwn(), srpt_add_one(), srpt_wwn_to_sport_id() and srpt_make_tport() functions in drivers/infiniband/ulp/srpt/ib_srpt.c. A local user can escalate privileges on the system.


How to mitigate CVE-2022-50129

Install update from vendor's repository.

Sources