CVE-2022-50843
Description
In the Linux kernel, the following vulnerability has been resolved:
dm clone: Fix UAF in clone_dtr()
Dm_clone also has the same UAF problem when dm_resume() and dm_destroy() are concurrent.
Therefore, cancelling timer again in clone_dtr().
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
dm clone in Linux kernel is vulnerable to a use-after-free (UAF) bug when concurrent dm_resume() and dm_destroy() operations occur; fixing by cancelling the timer again in clone_dtr().
Vulnerability
Overview
In the Linux kernel's device-mapper (dm) clone target, a use-after-free (UAF) vulnerability exists when dm_resume() and dm_destroy() are invoked concurrently. The failure to properly cancel a timer in the device's destructor function (clone_dtr()) before freeing associated memory allows the timer handler to operate on freed data structures.
Attack
Surface and Exploitation
Exploitation requires the ability to trigger both a resume and a destroy operation on a dm-clone device simultaneously. This is achievable locally by a user with sufficient privileges to interact with device-mapper control interfaces. No network-based attack vector is present; the privilege needed is CAP_SYS_ADMIN or equivalent access to the dm subsystem. The race window between the two operations enables the UAF condition.
Impact
A successful exploit can lead to a kernel panic, denial of service, or potentially arbitrary code execution in kernel context, depending on the state of memory at the time of the race. The UAF may corrupt kernel memory, compromising system stability and security.
Mitigation
The fix, backported to stable kernel versions, involves cancelling the timer again in clone_dtr() to ensure no pending timer fires after the device structure is freed [1][2]. System administrators should apply the corresponding kernel patch or update to a fixed kernel version to mitigate this vulnerability.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
6520b56cfd9fa342cfd8426df856edd0e92f3b1ddb666073b9e113cd4f61fe4b5957c6f74Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
6- git.kernel.org/stable/c/342cfd8426dff4228e6c714bcb9fc8295a2748ddnvd
- git.kernel.org/stable/c/520b56cfd9faee7683f081c3a38f11a81b13a68envd
- git.kernel.org/stable/c/856edd0e92f3fe89606b704c86a93daedddfe6ecnvd
- git.kernel.org/stable/c/9e113cd4f61f3b0000843b2d0a90ce8b40a1fcffnvd
- git.kernel.org/stable/c/b1ddb666073bb5f36390aaabaa1a4d48d78c52ednvd
- git.kernel.org/stable/c/e4b5957c6f749a501c464f92792f1c8e26b61a94nvd
News mentions
0No linked articles in our index yet.