CVE-2022-49770

In the Linux kernel, the following vulnerability has been resolved: ceph: avoid putting the realm twice when decoding snaps fails When decoding the snaps fails it maybe leaving the 'first_realm' and 'realm' pointing to the same snaprealm memory. And then it'll put it twice and could cause random use-after-free, BUG_ON, etc issues.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.34:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.34:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.34:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.34:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.34:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.34:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.34:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*

History

06 Nov 2025, 21:45

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ceph: evita repetir el dominio cuando falla la decodificación de snaps. Al fallar la decodificación de snaps, puede que "first_realm" y "realm" apunten a la misma memoria de snaprealm. En ese caso, lo repetirá, lo que podría causar problemas aleatorios de use-after-free, BUG_ON, etc.
CPE cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.34:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.34:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.34:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.34:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.34:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.34:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.34:rc5:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
First Time Linux
Linux linux Kernel
CWE CWE-416
References () https://git.kernel.org/stable/c/044bc6d3c2c0e9090b0841e7b723875756534b45 - () https://git.kernel.org/stable/c/044bc6d3c2c0e9090b0841e7b723875756534b45 - Patch
References () https://git.kernel.org/stable/c/274e4c79a3a2a24fba7cfe0e41113f1138785c37 - () https://git.kernel.org/stable/c/274e4c79a3a2a24fba7cfe0e41113f1138785c37 - Patch
References () https://git.kernel.org/stable/c/2f6e2de3a5289004650118b61f138fe7c28e1905 - () https://git.kernel.org/stable/c/2f6e2de3a5289004650118b61f138fe7c28e1905 - Patch
References () https://git.kernel.org/stable/c/51884d153f7ec85e18d607b2467820a90e0f4359 - () https://git.kernel.org/stable/c/51884d153f7ec85e18d607b2467820a90e0f4359 - Patch
References () https://git.kernel.org/stable/c/cb7495fe957526555782ce0723f79ce92a6db22e - () https://git.kernel.org/stable/c/cb7495fe957526555782ce0723f79ce92a6db22e - Patch
References () https://git.kernel.org/stable/c/fd879c83e87735ab8f00ef7755752cf0cbae24b2 - () https://git.kernel.org/stable/c/fd879c83e87735ab8f00ef7755752cf0cbae24b2 - Patch

01 May 2025, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-01 15:15

Updated : 2025-11-06 21:45


NVD link : CVE-2022-49770

Mitre link : CVE-2022-49770

CVE.ORG link : CVE-2022-49770


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free