{"id":"CVE-2022-50422","summary":"scsi: libsas: Fix use-after-free bug in smp_execute_task_sg()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: libsas: Fix use-after-free bug in smp_execute_task_sg()\n\nWhen executing SMP task failed, the smp_execute_task_sg() calls del_timer()\nto delete \"slow_task-\u003etimer\". However, if the timer handler\nsas_task_internal_timedout() is running, the del_timer() in\nsmp_execute_task_sg() will not stop it and a UAF will happen. The process\nis shown below:\n\n      (thread 1)               |        (thread 2)\nsmp_execute_task_sg()          | sas_task_internal_timedout()\n ...                           |\n del_timer()                   |\n ...                           |  ...\n sas_free_task(task)           |\n  kfree(task-\u003eslow_task) //FREE|\n                               |  task-\u003eslow_task-\u003e... //USE\n\nFix by calling del_timer_sync() in smp_execute_task_sg(), which makes sure\nthe timer handler have finished before the \"task-\u003eslow_task\" is\ndeallocated.","modified":"2026-04-02T08:28:29.967633Z","published":"2025-10-01T11:41:55.147Z","related":["SUSE-SU-2025:03613-1","SUSE-SU-2025:03614-1","SUSE-SU-2025:03615-1","SUSE-SU-2025:03626-1","SUSE-SU-2025:03628-1","SUSE-SU-2025:3716-1","SUSE-SU-2025:3761-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50422.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/117331a2a5227fb4369c2a1f321d3e3e2e2ef8fe"},{"type":"WEB","url":"https://git.kernel.org/stable/c/2e12ce270f0d926085c1209cc90397e307deef97"},{"type":"WEB","url":"https://git.kernel.org/stable/c/46ba53c30666717cb06c2b3c5d896301cd00d0c0"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a9e5176ead6de64f572ad5c87a72825d9d3c82ae"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e45a1516d2933703a4823d9db71e17c3abeba24f"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f7a785177611ffc97d645fcbc196e6de6ad2421d"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50422.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50422"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"2908d778ab3e244900c310974e1fc1c69066e450"},{"fixed":"117331a2a5227fb4369c2a1f321d3e3e2e2ef8fe"},{"fixed":"a9e5176ead6de64f572ad5c87a72825d9d3c82ae"},{"fixed":"e45a1516d2933703a4823d9db71e17c3abeba24f"},{"fixed":"f7a785177611ffc97d645fcbc196e6de6ad2421d"},{"fixed":"2e12ce270f0d926085c1209cc90397e307deef97"},{"fixed":"46ba53c30666717cb06c2b3c5d896301cd00d0c0"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50422.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}