CVE-2022-1016

Source
https://cve.org/CVERecord?id=CVE-2022-1016
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-1016.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-1016
Downstream
Related
Published
2022-08-29T15:15:10.143Z
Modified
2026-02-11T13:25:44.646876Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

A flaw was found in the Linux kernel in net/netfilter/nftablescore.c:nftdochain, which can cause a use-after-free. This issue needs to handle 'return' with proper preconditions, as it can lead to a kernel information leak problem caused by a local, unprivileged attacker.

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
5e01dc7b26d9f24f39abace5da98ccbd6a5ceb52
Introduced
d8ec26d7f8287f5788a494f56e8814210f0e64be
Last affected
f443e374ae131c168a065ea1748feac6b2e76613

Affected versions

v3.*
v3.13

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-1016.json"