CVE-2022-49622

Severity CVSS v4.0:
Pending analysis
Type:
CWE-416 Use After Free
Publication date:
26/02/2025
Last modified:
24/03/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> netfilter: nf_tables: avoid skb access on nf_stolen<br /> <br /> When verdict is NF_STOLEN, the skb might have been freed.<br /> <br /> When tracing is enabled, this can result in a use-after-free:<br /> 1. access to skb-&gt;nf_trace<br /> 2. access to skb-&gt;mark<br /> 3. computation of trace id<br /> 4. dump of packet payload<br /> <br /> To avoid 1, keep a cached copy of skb-&gt;nf_trace in the<br /> trace state struct.<br /> Refresh this copy whenever verdict is != STOLEN.<br /> <br /> Avoid 2 by skipping skb-&gt;mark access if verdict is STOLEN.<br /> <br /> 3 is avoided by precomputing the trace id.<br /> <br /> Only dump the packet when verdict is not "STOLEN".

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.18.13 (excluding)
cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:*