0.0
NA
CVE-2022-50840
scsi: snic: Fix possible UAF in snic_tgt_create()
Description

In the Linux kernel, the following vulnerability has been resolved: scsi: snic: Fix possible UAF in snic_tgt_create() Smatch reports a warning as follows: drivers/scsi/snic/snic_disc.c:307 snic_tgt_create() warn: '&tgt->list' not removed from list If device_add() fails in snic_tgt_create(), tgt will be freed, but tgt->list will not be removed from snic->disc.tgt_list, then list traversal may cause UAF. Remove from snic->disc.tgt_list before free().

INFO

Published Date :

Dec. 30, 2025, 1:15 p.m.

Last Modified :

Dec. 30, 2025, 1:15 p.m.

Remotely Exploit :

No

Source :

416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Products

The following products are affected by CVE-2022-50840 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

No affected product recoded yet

Solution
Fix possible use-after-free in snic_tgt_create by removing from list before freeing memory.
  • Remove tgt from snic->disc.tgt_list before freeing memory.
  • Update the Linux kernel to the latest version.
  • Apply the provided patch for snic_tgt_create.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2022-50840 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2022-50840 weaknesses.

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2022-50840 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2022-50840 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • New CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67

    Dec. 30, 2025

    Action Type Old Value New Value
    Added Description In the Linux kernel, the following vulnerability has been resolved: scsi: snic: Fix possible UAF in snic_tgt_create() Smatch reports a warning as follows: drivers/scsi/snic/snic_disc.c:307 snic_tgt_create() warn: '&tgt->list' not removed from list If device_add() fails in snic_tgt_create(), tgt will be freed, but tgt->list will not be removed from snic->disc.tgt_list, then list traversal may cause UAF. Remove from snic->disc.tgt_list before free().
    Added Reference https://git.kernel.org/stable/c/1895e908b3ae66a5312fd1b2cdda2da82993dca7
    Added Reference https://git.kernel.org/stable/c/3007f96ca20c848d0b1b052df6d2cb5ae5586e78
    Added Reference https://git.kernel.org/stable/c/3772319e40527e6a5f2ec1d729e01f271d818f5c
    Added Reference https://git.kernel.org/stable/c/4141cd9e8b3379aea52a85d2c35f6eaf26d14e86
    Added Reference https://git.kernel.org/stable/c/6866154c23fba40888ad6d554cccd4bf2edb755e
    Added Reference https://git.kernel.org/stable/c/ad27f74e901fc48729733c88818e6b96c813057d
    Added Reference https://git.kernel.org/stable/c/c7f0f8dab1ae5def57c1a8a9cafd6fabe1dc27cc
    Added Reference https://git.kernel.org/stable/c/e118df492320176af94deec000ae034cc92be754
    Added Reference https://git.kernel.org/stable/c/f9d8b8ba0f1a16cde0b1fc9e80466df76b6db8ff
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
Vulnerability Scoring Details
No CVSS metrics available for this vulnerability.