Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: srcu: Tighten cleanup_srcu_struct() GP checks Currently, cleanup_srcu_struct() checks for a grace period in progress, but it does not check for a grace period that has not yet started but which might start at any time. Such a situation could result in a use-after-free bug, so this commit adds a check for a grace period that is needed but not yet started to cleanup_srcu_struct().
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | < 5.18.11 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/8ed00760203d8018bee042fbfe8e076579be2c2bPatch
- https://git.kernel.org/stable/c/e997dda6502eefbc1032d6b0da7b353c53344b07Patch
FAQ
What is CVE-2022-49651?
CVE-2022-49651 is a vulnerability with a CVSS score of 7.8 (HIGH). In the Linux kernel, the following vulnerability has been resolved: srcu: Tighten cleanup_srcu_struct() GP checks Currently, cleanup_srcu_struct() checks for a grace period in progress, but it does ...
How severe is CVE-2022-49651?
CVE-2022-49651 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-49651?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.