{"vulnerability": "CVE-2022-49920", "sightings": [{"uuid": "93e352a3-2da8-4951-bb18-8006be8e98f0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-49920", "type": "seen", "source": "https://t.me/cvedetector/24245", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2022-49920 - Linux kernel Netfilter Netlink Notifier Race Condition\", \n  \"Content\": \"CVE ID : CVE-2022-49920 \nPublished : May 1, 2025, 3:16 p.m. | 1\u00a0hour, 9\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nnetfilter: nf_tables: netlink notifier might race to release objects  \n  \ncommit release path is invoked via call_rcu and it runs lockless to  \nrelease the objects after rcu grace period. The netlink notifier handler  \nmight win race to remove objects that the transaction context is still  \nreferencing from the commit release path.  \n  \nCall rcu_barrier() to ensure pending rcu callbacks run to completion  \nif the list of transactions to be destroyed is not empty. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-01T19:01:36.000000Z"}]}