{"id":"CVE-2022-49127","summary":"ref_tracker: implement use-after-free detection","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nref_tracker: implement use-after-free detection\n\nWhenever ref_tracker_dir_init() is called, mark the struct ref_tracker_dir\nas dead.\n\nTest the dead status from ref_tracker_alloc() and ref_tracker_free()\n\nThis should detect buggy dev_put()/dev_hold() happening too late\nin netdevice dismantle process.","modified":"2026-03-20T12:22:11.593363Z","published":"2025-02-26T01:55:04.643Z","database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49127.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/3743c9de303fa36c2e2ca2522ab280c52bcafbd2"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e3ececfe668facd87d920b608349a32607060e66"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49127.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49127"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"4e66934eaadc83b27ada8d42b60894018f3bfabf"},{"fixed":"3743c9de303fa36c2e2ca2522ab280c52bcafbd2"},{"fixed":"e3ececfe668facd87d920b608349a32607060e66"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49127.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}