vulnerability
Ubuntu: (CVE-2022-49920): linux vulnerability
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 4 | (AV:L/AC:M/Au:S/C:N/I:N/A:C) | May 1, 2025 | May 8, 2025 | Apr 16, 2026 |
Severity
4
CVSS
(AV:L/AC:M/Au:S/C:N/I:N/A:C)
Published
May 1, 2025
Added
May 8, 2025
Modified
Apr 16, 2026
Description
In the Linux kernel, the following vulnerability has been resolved:
netfilter: nf_tables: netlink notifier might race to release objects
commit release path is invoked via call_rcu and it runs lockless to
release the objects after rcu grace period. The netlink notifier handler
might win race to remove objects that the transaction context is still
referencing from the commit release path.
Call rcu_barrier() to ensure pending rcu callbacks run to completion
if the list of transactions to be destroyed is not empty.
Solutions
ubuntu-upgrade-linuxubuntu-upgrade-linux-awsubuntu-upgrade-linux-aws-5-15ubuntu-upgrade-linux-azureubuntu-upgrade-linux-azure-5-15ubuntu-upgrade-linux-bluefieldubuntu-upgrade-linux-gcpubuntu-upgrade-linux-gcp-5-15ubuntu-upgrade-linux-gkeubuntu-upgrade-linux-gkeopubuntu-upgrade-linux-hwe-5-15ubuntu-upgrade-linux-ibmubuntu-upgrade-linux-intel-iotgubuntu-upgrade-linux-intel-iotg-5-15ubuntu-upgrade-linux-kvmubuntu-upgrade-linux-lowlatencyubuntu-upgrade-linux-lowlatency-hwe-5-15ubuntu-upgrade-linux-nvidiaubuntu-upgrade-linux-oracleubuntu-upgrade-linux-oracle-5-15ubuntu-upgrade-linux-raspiubuntu-upgrade-linux-realtimeubuntu-upgrade-linux-riscv-5-15
References
- CVE-2022-49920
- https://attackerkb.com/topics/CVE-2022-49920
- CWE-362
- EUVD-EUVD-2025-12851
- https://euvd.enisa.europa.eu/vulnerability/EUVD-2025-12851
- https://git.kernel.org/linus/d4bc8271db21ea9f1c86a1ca4d64999f184d4aae
- https://git.kernel.org/stable/c/1ffe7100411a8b9015115ce124cd6c9c9da6f8e3
- https://git.kernel.org/stable/c/d4bc8271db21ea9f1c86a1ca4d64999f184d4aae
- https://git.kernel.org/stable/c/e40b7c44d19e327ad8b49a491ef1fa8dcc4566e0
- https://www.cve.org/CVERecord?id=CVE-2022-49920
Rapid7 Labs
2026 Global Threat Landscape Report
The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.