In the Linux kernel, the following vulnerability has been resolved:
media: dvbdev: adopts refcnt to avoid UAF
dvb_unregister_device() is known that prone to use-after-free.
That is, the cleanup from dvb_unregister_device() releases the dvb_device
even if there are pointers stored in file->private_data still refer to it.
This patch adds a reference counter into struct dvb_device and delays its
deallocation until no pointer refers to the object.
References
Configurations
Configuration 1 (hide)
|
History
03 Dec 2025, 18:21
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://git.kernel.org/stable/c/0fc044b2b5e2d05a1fa1fb0d7f270367a7855d79 - Patch | |
| References | () https://git.kernel.org/stable/c/219b44bf94203bd433aa91b7796475bf656348e5 - Patch | |
| References | () https://git.kernel.org/stable/c/2abd73433872194bccdf1432a0980e4ec5273c2a - Patch | |
| References | () https://git.kernel.org/stable/c/6d18b44bb44e1f4d97dfe0efe92ac0f0984739c2 - Patch | |
| References | () https://git.kernel.org/stable/c/88a6f8a72d167294c0931c7874941bf37a41b6dd - Patch | |
| References | () https://git.kernel.org/stable/c/9945d05d6693710574f354c5dbddc47f5101eb77 - Patch | |
| References | () https://git.kernel.org/stable/c/a2f0a08aa613176c9688c81d7b598a7779974991 - Patch | |
| References | () https://git.kernel.org/stable/c/ac521bbe3d00fa574e66a9361763f2b37725bc97 - Patch | |
| CWE | CWE-416 | |
| First Time |
Linux
Linux linux Kernel |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
Information
Published : 2025-09-15 15:15
Updated : 2025-12-03 18:21
NVD link : CVE-2022-50274
Mitre link : CVE-2022-50274
CVE.ORG link : CVE-2022-50274
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free
