CVE-2022-48639

Source
https://cve.org/CVERecord?id=CVE-2022-48639
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48639.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-48639
Downstream
Related
Published
2024-04-28T12:59:42.410Z
Modified
2026-04-11T12:41:16.047333Z
Summary
net: sched: fix possible refcount leak in tc_new_tfilter()
Details

In the Linux kernel, the following vulnerability has been resolved:

net: sched: fix possible refcount leak in tcnewtfilter()

tfilterput need to be called to put the refount got by tp->ops->get to avoid possible refcount leak when chain->tmpltops != NULL and chain->tmplt_ops != tp->ops.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/48xxx/CVE-2022-48639.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
7d5509fa0d3ddfe252b4418513e493ac98de3317
Fixed
903f7d322c17d8e306d766404b4604e81653902a
Fixed
8844c750eeb03452e2b3319c27a526f447b82596
Fixed
f8162aed962be8fa07445b2b5928e84ab40dd8d7
Fixed
0559d91ee3a2cd81b15ad5cd507539d6da867f88
Fixed
c2e1cfefcac35e0eea229e148c8284088ce437b5

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48639.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.1.0
Fixed
5.4.215
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.146
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.71
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
5.19.12

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48639.json"