CVE-2022-49127

In the Linux kernel, the following vulnerability has been resolved: ref_tracker: implement use-after-free detection Whenever ref_tracker_dir_init() is called, mark the struct ref_tracker_dir as dead. Test the dead status from ref_tracker_alloc() and ref_tracker_free() This should detect buggy dev_put()/dev_hold() happening too late in netdevice dismantle process.
CVSS

No CVSS.

Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

25 Mar 2025, 16:19

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/3743c9de303fa36c2e2ca2522ab280c52bcafbd2 - () https://git.kernel.org/stable/c/3743c9de303fa36c2e2ca2522ab280c52bcafbd2 - Patch
References () https://git.kernel.org/stable/c/e3ececfe668facd87d920b608349a32607060e66 - () https://git.kernel.org/stable/c/e3ececfe668facd87d920b608349a32607060e66 - Patch
First Time Linux linux Kernel
Linux

26 Feb 2025, 07:00

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-26 07:00

Updated : 2025-03-25 16:19


NVD link : CVE-2022-49127

Mitre link : CVE-2022-49127


JSON object : View

Products Affected

linux

  • linux_kernel
CWE

No CWE.