๐Ÿ” CVE Alert

CVE-2022-50129

UNKNOWN 0.0

RDMA/srpt: Fix a use-after-free

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: RDMA/srpt: Fix a use-after-free Change the LIO port members inside struct srpt_port from regular members into pointers. Allocate the LIO port data structures from inside srpt_make_tport() and free these from inside srpt_make_tport(). Keep struct srpt_device as long as either an RDMA port or a LIO target port is associated with it. This patch decouples the lifetime of struct srpt_port (controlled by the RDMA core) and struct srpt_port_id (controlled by LIO). This patch fixes the following KASAN complaint: BUG: KASAN: use-after-free in srpt_enable_tpg+0x31/0x70 [ib_srpt] Read of size 8 at addr ffff888141cc34b8 by task check/5093 Call Trace: <TASK> show_stack+0x4e/0x53 dump_stack_lvl+0x51/0x66 print_address_description.constprop.0.cold+0xea/0x41e print_report.cold+0x90/0x205 kasan_report+0xb9/0xf0 __asan_load8+0x69/0x90 srpt_enable_tpg+0x31/0x70 [ib_srpt] target_fabric_tpg_base_enable_store+0xe2/0x140 [target_core_mod] configfs_write_iter+0x18b/0x210 new_sync_write+0x1f2/0x2f0 vfs_write+0x3e3/0x540 ksys_write+0xbb/0x140 __x64_sys_write+0x42/0x50 do_syscall_64+0x34/0x80 entry_SYSCALL_64_after_hwframe+0x46/0xb0 </TASK>

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Jun 18, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
a42d985bd5b234da8b61347a78dc3057bf7bb94d < de95b52d9aabc979166aba81ccbe623aaf9c16a1 a42d985bd5b234da8b61347a78dc3057bf7bb94d < e60d7e2462bf57273563c4e00dbfa79ee973b9e2 a42d985bd5b234da8b61347a78dc3057bf7bb94d < 4ee8c39968a648d58b273582d4b021044a41ee5e a42d985bd5b234da8b61347a78dc3057bf7bb94d < 388326bb1c32fcd09371c1d494af71471ef3a04b a42d985bd5b234da8b61347a78dc3057bf7bb94d < b5605148e6ce36bb21020d49010b617693933128
Linux / Linux
3.3

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/de95b52d9aabc979166aba81ccbe623aaf9c16a1 git.kernel.org: https://git.kernel.org/stable/c/e60d7e2462bf57273563c4e00dbfa79ee973b9e2 git.kernel.org: https://git.kernel.org/stable/c/4ee8c39968a648d58b273582d4b021044a41ee5e git.kernel.org: https://git.kernel.org/stable/c/388326bb1c32fcd09371c1d494af71471ef3a04b git.kernel.org: https://git.kernel.org/stable/c/b5605148e6ce36bb21020d49010b617693933128