CVE-2022-49919

In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: release flow rule object from commit path No need to postpone this to the commit release path, since no packets are walking over this object, this is accessed from control plane only. This helped uncovered UAF triggered by races with the netlink notifier.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

07 May 2025, 13:27

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.0
CWE CWE-362
CWE-416
CPE cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/26b5934ff4194e13196bedcba373cd4915071d0e - () https://git.kernel.org/stable/c/26b5934ff4194e13196bedcba373cd4915071d0e - Patch
References () https://git.kernel.org/stable/c/74fd5839467054cd9c4d050614d3ee8788386171 - () https://git.kernel.org/stable/c/74fd5839467054cd9c4d050614d3ee8788386171 - Patch
References () https://git.kernel.org/stable/c/4ab6f96444e936f5e4a936d5c0bc948144bcded3 - () https://git.kernel.org/stable/c/4ab6f96444e936f5e4a936d5c0bc948144bcded3 - Patch
References () https://git.kernel.org/stable/c/6044791b7be707fd0e709f26e961a446424e5051 - () https://git.kernel.org/stable/c/6044791b7be707fd0e709f26e961a446424e5051 - Patch
References () https://git.kernel.org/stable/c/b2d7a92aff0fbd93c29d2aa6451fb99f050e2c4e - () https://git.kernel.org/stable/c/b2d7a92aff0fbd93c29d2aa6451fb99f050e2c4e - Patch
First Time Linux linux Kernel
Linux

01 May 2025, 15:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-01 15:16

Updated : 2025-05-07 13:27


NVD link : CVE-2022-49919

Mitre link : CVE-2022-49919


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

CWE-416

Use After Free