CVE-2022-50274

In the Linux kernel, the following vulnerability has been resolved: media: dvbdev: adopts refcnt to avoid UAF dvb_unregister_device() is known that prone to use-after-free. That is, the cleanup from dvb_unregister_device() releases the dvb_device even if there are pointers stored in file->private_data still refer to it. This patch adds a reference counter into struct dvb_device and delays its deallocation until no pointer refers to the object.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

03 Dec 2025, 18:21

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/0fc044b2b5e2d05a1fa1fb0d7f270367a7855d79 - () https://git.kernel.org/stable/c/0fc044b2b5e2d05a1fa1fb0d7f270367a7855d79 - Patch
References () https://git.kernel.org/stable/c/219b44bf94203bd433aa91b7796475bf656348e5 - () https://git.kernel.org/stable/c/219b44bf94203bd433aa91b7796475bf656348e5 - Patch
References () https://git.kernel.org/stable/c/2abd73433872194bccdf1432a0980e4ec5273c2a - () https://git.kernel.org/stable/c/2abd73433872194bccdf1432a0980e4ec5273c2a - Patch
References () https://git.kernel.org/stable/c/6d18b44bb44e1f4d97dfe0efe92ac0f0984739c2 - () https://git.kernel.org/stable/c/6d18b44bb44e1f4d97dfe0efe92ac0f0984739c2 - Patch
References () https://git.kernel.org/stable/c/88a6f8a72d167294c0931c7874941bf37a41b6dd - () https://git.kernel.org/stable/c/88a6f8a72d167294c0931c7874941bf37a41b6dd - Patch
References () https://git.kernel.org/stable/c/9945d05d6693710574f354c5dbddc47f5101eb77 - () https://git.kernel.org/stable/c/9945d05d6693710574f354c5dbddc47f5101eb77 - Patch
References () https://git.kernel.org/stable/c/a2f0a08aa613176c9688c81d7b598a7779974991 - () https://git.kernel.org/stable/c/a2f0a08aa613176c9688c81d7b598a7779974991 - Patch
References () https://git.kernel.org/stable/c/ac521bbe3d00fa574e66a9361763f2b37725bc97 - () https://git.kernel.org/stable/c/ac521bbe3d00fa574e66a9361763f2b37725bc97 - Patch
CWE CWE-416
First Time Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Information

Published : 2025-09-15 15:15

Updated : 2025-12-03 18:21


NVD link : CVE-2022-50274

Mitre link : CVE-2022-50274

CVE.ORG link : CVE-2022-50274


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free