VYPR
Unrated severityNVD Advisory· Published Dec 30, 2025· Updated Apr 15, 2026

CVE-2022-50843

CVE-2022-50843

Description

In the Linux kernel, the following vulnerability has been resolved:

dm clone: Fix UAF in clone_dtr()

Dm_clone also has the same UAF problem when dm_resume() and dm_destroy() are concurrent.

Therefore, cancelling timer again in clone_dtr().

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

dm clone in Linux kernel is vulnerable to a use-after-free (UAF) bug when concurrent dm_resume() and dm_destroy() operations occur; fixing by cancelling the timer again in clone_dtr().

Vulnerability

Overview

In the Linux kernel's device-mapper (dm) clone target, a use-after-free (UAF) vulnerability exists when dm_resume() and dm_destroy() are invoked concurrently. The failure to properly cancel a timer in the device's destructor function (clone_dtr()) before freeing associated memory allows the timer handler to operate on freed data structures.

Attack

Surface and Exploitation

Exploitation requires the ability to trigger both a resume and a destroy operation on a dm-clone device simultaneously. This is achievable locally by a user with sufficient privileges to interact with device-mapper control interfaces. No network-based attack vector is present; the privilege needed is CAP_SYS_ADMIN or equivalent access to the dm subsystem. The race window between the two operations enables the UAF condition.

Impact

A successful exploit can lead to a kernel panic, denial of service, or potentially arbitrary code execution in kernel context, depending on the state of memory at the time of the race. The UAF may corrupt kernel memory, compromising system stability and security.

Mitigation

The fix, backported to stable kernel versions, involves cancelling the timer again in clone_dtr() to ensure no pending timer fires after the device structure is freed [1][2]. System administrators should apply the corresponding kernel patch or update to a fixed kernel version to mitigate this vulnerability.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

6

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

6

News mentions

0

No linked articles in our index yet.