cve-2022-49919
Vulnerability from cvelistv5
Published
2025-05-01 14:10
Modified
2025-05-04 12:45
Severity ?
EPSS score ?
Summary
netfilter: nf_tables: release flow rule object from commit path
References
{ "containers": { "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "net/netfilter/nf_tables_api.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "74fd5839467054cd9c4d050614d3ee8788386171", "status": "affected", "version": "5b8d63489c3b701eb2a76f848ec94d8cbc9373b9", "versionType": "git" }, { "lessThan": "b2d7a92aff0fbd93c29d2aa6451fb99f050e2c4e", "status": "affected", "version": "330c0c6cd2150a2d7f47af16aa590078b0d2f736", "versionType": "git" }, { "lessThan": "6044791b7be707fd0e709f26e961a446424e5051", "status": "affected", "version": "e33d9bd563e71f6c6528b96008d65524a459c4dc", "versionType": "git" }, { "lessThan": "4ab6f96444e936f5e4a936d5c0bc948144bcded3", "status": "affected", "version": "9dd732e0bdf538b1b76dc7c157e2b5e560ff30d3", "versionType": "git" }, { "lessThan": "26b5934ff4194e13196bedcba373cd4915071d0e", "status": "affected", "version": "9dd732e0bdf538b1b76dc7c157e2b5e560ff30d3", "versionType": "git" }, { "status": "affected", "version": "80de9ea1f5b808a6601e91111fae601df2b26369", "versionType": "git" }, { "status": "affected", "version": "ab9f34a30c23f656e76f4c5b83125a4e7b53c86e", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "net/netfilter/nf_tables_api.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "5.19" }, { "lessThan": "5.19", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "5.4.*", "status": "unaffected", "version": "5.4.224", "versionType": "semver" }, { "lessThanOrEqual": "5.10.*", "status": "unaffected", "version": "5.10.154", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.78", "versionType": "semver" }, { "lessThanOrEqual": "6.0.*", "status": "unaffected", "version": "6.0.8", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.1", "versionType": "original_commit_for_fix" } ] } ], "cpeApplicability": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "5.4.224", "versionStartIncluding": "5.4.198", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "5.10.154", "versionStartIncluding": "5.10.122", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "5.15.78", "versionStartIncluding": "5.15.47", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.0.8", "versionStartIncluding": "5.19", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.1", "versionStartIncluding": "5.19", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.17.15", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.18.4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: release flow rule object from commit path\n\nNo need to postpone this to the commit release path, since no packets\nare walking over this object, this is accessed from control plane only.\nThis helped uncovered UAF triggered by races with the netlink notifier." } ], "providerMetadata": { "dateUpdated": "2025-05-04T12:45:27.331Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/74fd5839467054cd9c4d050614d3ee8788386171" }, { "url": "https://git.kernel.org/stable/c/b2d7a92aff0fbd93c29d2aa6451fb99f050e2c4e" }, { "url": "https://git.kernel.org/stable/c/6044791b7be707fd0e709f26e961a446424e5051" }, { "url": "https://git.kernel.org/stable/c/4ab6f96444e936f5e4a936d5c0bc948144bcded3" }, { "url": "https://git.kernel.org/stable/c/26b5934ff4194e13196bedcba373cd4915071d0e" } ], "title": "netfilter: nf_tables: release flow rule object from commit path", "x_generator": { "engine": "bippy-1.2.0" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2022-49919", "datePublished": "2025-05-01T14:10:58.779Z", "dateReserved": "2025-05-01T14:05:17.251Z", "dateUpdated": "2025-05-04T12:45:27.331Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2022-49919\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-05-01T15:16:17.380\",\"lastModified\":\"2025-05-02T13:52:51.693\",\"vulnStatus\":\"Undergoing Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nnetfilter: nf_tables: release flow rule object from commit path\\n\\nNo need to postpone this to the commit release path, since no packets\\nare walking over this object, this is accessed from control plane only.\\nThis helped uncovered UAF triggered by races with the netlink notifier.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: netfilter: nf_tables: liberaci\u00f3n del objeto de regla de flujo desde la ruta de confirmaci\u00f3n. No es necesario posponer esto hasta la ruta de liberaci\u00f3n de la confirmaci\u00f3n, ya que ning\u00fan paquete pasa por este objeto; solo se accede a \u00e9l desde el plano de control. Esto ayud\u00f3 a descubrir el UAF activado por ejecuciones con el notificador netlink.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/26b5934ff4194e13196bedcba373cd4915071d0e\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/4ab6f96444e936f5e4a936d5c0bc948144bcded3\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/6044791b7be707fd0e709f26e961a446424e5051\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/74fd5839467054cd9c4d050614d3ee8788386171\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/b2d7a92aff0fbd93c29d2aa6451fb99f050e2c4e\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}" } }
Loading...
Loading...
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.