vulnerability
Arch Linux: Use After Free (CVE-2022-47939)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 10 | (AV:N/AC:L/Au:N/C:C/I:C/A:C) | Dec 23, 2022 | Jul 11, 2025 | Nov 27, 2025 |
Severity
10
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Published
Dec 23, 2022
Added
Jul 11, 2025
Modified
Nov 27, 2025
Description
use-after-free in smb2_tree_disconnect) when a danging pointer is accessed in compound requests
Solution
arch-linux-upgrade-latest
References
- CVE-2022-47939
- https://attackerkb.com/topics/CVE-2022-47939
- URL-http://www.openwall.com/lists/oss-security/2022/12/23/10
- URL-https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19.2
- URL-https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cf6531d98190fa2cf92a6d8bbc8af0a4740a223c
- URL-https://github.com/torvalds/linux/commit/cf6531d98190fa2cf92a6d8bbc8af0a4740a223c
- URL-https://www.secpod.com/blog/zero-day-server-message-block-smb-server-in-linux-kernel-5-15-has-a-critical-vulnerability-patch-ksmbd-immediately/
- URL-https://www.zerodayinitiative.com/advisories/ZDI-22-1690/
- CWE-416
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.