
Cloud Vulnerability DB
A community-led vulnerabilities database
A use-after-free vulnerability was discovered in the Linux kernel's RAID5 implementation, identified as CVE-2022-50022. The vulnerability was found in the drivers/md subsystem where a potential use-after-free bug exists due to premature release of a stripe handle. The issue was publicly disclosed on June 18, 2025, affecting various Linux kernel versions (NVD, Wiz).
The vulnerability occurs when raid5_release_stripe(sh) is called at line 2884, which drops the reference to sh and may cause it to be released. However, the stripe handle is subsequently used in line 2886 in the condition 'if (sh->batch_head && sh != sh->batch_head)', creating a use-after-free condition that could lead to memory corruption (NVD, Wiz).
A successful exploitation of this vulnerability could lead to memory corruption in the kernel's RAID5 subsystem, potentially resulting in system crashes or other undefined behavior. The issue specifically affects systems using RAID5 configurations in the Linux kernel (Wiz).
The vulnerability can be fixed by moving the raid5_release_stripe(sh) call to the bottom of the function, ensuring that all uses of the stripe handle are completed before releasing it. Fixed versions are available in various distributions: Debian Bullseye (5.10.237-1), Bookworm (6.1.140-1), and Trixie (6.12.31-1) (Debian Tracker, Wiz).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."