CVE-2022-49811

In the Linux kernel, the following vulnerability has been resolved: drbd: use after free in drbd_create_device() The drbd_destroy_connection() frees the "connection" so use the _safe() iterator to prevent a use after free.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*

History

07 Nov 2025, 19:03

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/7d93417d596402ddd46bd76c721f205d09d0d025 - () https://git.kernel.org/stable/c/7d93417d596402ddd46bd76c721f205d09d0d025 - Patch
References () https://git.kernel.org/stable/c/813a8dd9c45fd46f5cbbfbedf0791afa7740ccf5 - () https://git.kernel.org/stable/c/813a8dd9c45fd46f5cbbfbedf0791afa7740ccf5 - Patch
References () https://git.kernel.org/stable/c/9ed51414aef6e59e832e2960f10766dce2d5b1a1 - () https://git.kernel.org/stable/c/9ed51414aef6e59e832e2960f10766dce2d5b1a1 - Patch
References () https://git.kernel.org/stable/c/a7a1598189228b5007369a9622ccdf587be0730f - () https://git.kernel.org/stable/c/a7a1598189228b5007369a9622ccdf587be0730f - Patch
References () https://git.kernel.org/stable/c/bf47ca1b35fc1f55091ffaff5fbe41ea0c6f59a1 - () https://git.kernel.org/stable/c/bf47ca1b35fc1f55091ffaff5fbe41ea0c6f59a1 - Patch
References () https://git.kernel.org/stable/c/c2a00b149836d60c222930bbea6b2139caf34d4f - () https://git.kernel.org/stable/c/c2a00b149836d60c222930bbea6b2139caf34d4f - Patch
References () https://git.kernel.org/stable/c/fc1897f16ebcfd22364f2afcc27f53a740f3bc7a - () https://git.kernel.org/stable/c/fc1897f16ebcfd22364f2afcc27f53a740f3bc7a - Patch
First Time Linux
Linux linux Kernel
CWE CWE-416
CPE cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8

02 May 2025, 13:53

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drbd: use-after-free en drbd_create_device(). drbd_destroy_connection() libera la "conexión", así que use el iterador _safe() para evitar un use-after-free.

01 May 2025, 15:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-01 15:16

Updated : 2025-11-07 19:03


NVD link : CVE-2022-49811

Mitre link : CVE-2022-49811

CVE.ORG link : CVE-2022-49811


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free