First published: Thu May 01 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: netlink notifier might race to release objects commit release path is invoked via call_rcu and it runs lockless to release the objects after rcu grace period. The netlink notifier handler might win race to remove objects that the transaction context is still referencing from the commit release path. Call rcu_barrier() to ensure pending rcu callbacks run to completion if the list of transactions to be destroyed is not empty.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-49920 is classified as a medium severity vulnerability in the Linux kernel.
To fix CVE-2022-49920, update your Linux kernel to the latest version that includes the patch for this vulnerability.
CVE-2022-49920 affects various distributions of the Linux kernel that utilize netfilter and nf_tables.
CVE-2022-49920 is a race condition vulnerability that may allow for improper resource management in the Linux kernel.
You can assess the presence of CVE-2022-49920 by checking your current Linux kernel version against the patched versions in the security advisory.