Lucene search

K
cveLinuxCVE-2022-48911
HistoryAug 22, 2024 - 2:15 a.m.

CVE-2022-48911

2024-08-2202:15:05
CWE-416
Linux
web.nvd.nist.gov
34
linux kernel
netfilter
nf_queue
use-after-free
eric dumazet
vulnerability
skb prefetch
cve

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

AI Score

6.5

Confidence

Low

EPSS

0

Percentile

5.1%

In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_queue: fix possible use-after-free

Eric Dumazet says:
The sock_hold() side seems suspect, because there is no guarantee
that sk_refcnt is not already 0.

On failure, we cannot queue the packet and need to indicate an
error. The packet will be dropped by the caller.

v2: split skb prefetch hunk into separate change

Affected configurations

Nvd
Vulners
Node
linuxlinux_kernelRange2.6.294.9.305
OR
linuxlinux_kernelRange4.104.14.270
OR
linuxlinux_kernelRange4.154.19.233
OR
linuxlinux_kernelRange4.205.4.183
OR
linuxlinux_kernelRange5.55.10.104
OR
linuxlinux_kernelRange5.115.15.27
OR
linuxlinux_kernelRange5.165.16.13
OR
linuxlinux_kernelMatch5.17rc1
OR
linuxlinux_kernelMatch5.17rc2
OR
linuxlinux_kernelMatch5.17rc3
OR
linuxlinux_kernelMatch5.17rc4
OR
linuxlinux_kernelMatch5.17rc5
OR
linuxlinux_kernelMatch5.17rc6
VendorProductVersionCPE
linuxlinux_kernel*cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
linuxlinux_kernel5.17cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*
linuxlinux_kernel5.17cpe:2.3:o:linux:linux_kernel:5.17:rc2:*:*:*:*:*:*
linuxlinux_kernel5.17cpe:2.3:o:linux:linux_kernel:5.17:rc3:*:*:*:*:*:*
linuxlinux_kernel5.17cpe:2.3:o:linux:linux_kernel:5.17:rc4:*:*:*:*:*:*
linuxlinux_kernel5.17cpe:2.3:o:linux:linux_kernel:5.17:rc5:*:*:*:*:*:*
linuxlinux_kernel5.17cpe:2.3:o:linux:linux_kernel:5.17:rc6:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "Linux",
    "vendor": "Linux",
    "defaultStatus": "unaffected",
    "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
    "programFiles": [
      "include/net/netfilter/nf_queue.h",
      "net/netfilter/nf_queue.c",
      "net/netfilter/nfnetlink_queue.c"
    ],
    "versions": [
      {
        "version": "271b72c7fa82",
        "lessThan": "21b27b2baa27",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "271b72c7fa82",
        "lessThan": "ef97921ccdc2",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "271b72c7fa82",
        "lessThan": "34dc4a6a7f26",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "271b72c7fa82",
        "lessThan": "43c25da41e30",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "271b72c7fa82",
        "lessThan": "4d05239203fa",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "271b72c7fa82",
        "lessThan": "dd648bd1b33a",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "271b72c7fa82",
        "lessThan": "dcc3cb920bf7",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "271b72c7fa82",
        "lessThan": "c3873070247d",
        "status": "affected",
        "versionType": "git"
      }
    ]
  },
  {
    "product": "Linux",
    "vendor": "Linux",
    "defaultStatus": "affected",
    "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
    "programFiles": [
      "include/net/netfilter/nf_queue.h",
      "net/netfilter/nf_queue.c",
      "net/netfilter/nfnetlink_queue.c"
    ],
    "versions": [
      {
        "version": "2.6.29",
        "status": "affected"
      },
      {
        "version": "0",
        "lessThan": "2.6.29",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "4.9.305",
        "lessThanOrEqual": "4.9.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "4.14.270",
        "lessThanOrEqual": "4.14.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "4.19.233",
        "lessThanOrEqual": "4.19.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "5.4.183",
        "lessThanOrEqual": "5.4.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "5.10.104",
        "lessThanOrEqual": "5.10.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "5.15.27",
        "lessThanOrEqual": "5.15.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "5.16.13",
        "lessThanOrEqual": "5.16.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "5.17",
        "lessThanOrEqual": "*",
        "status": "unaffected",
        "versionType": "original_commit_for_fix"
      }
    ]
  }
]

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

AI Score

6.5

Confidence

Low

EPSS

0

Percentile

5.1%