CVE-2022-48691

Source
https://cve.org/CVERecord?id=CVE-2022-48691
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48691.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-48691
Downstream
Related
Published
2024-05-03T15:03:28.996Z
Modified
2026-04-11T12:41:16.880036Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L CVSS Calculator
Summary
netfilter: nf_tables: clean up hook list when offload flags check fails
Details

In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: clean up hook list when offload flags check fails

splice back the hook list so nftchainrelease_hook() has a chance to release the hooks.

BUG: memory leak unreferenced object 0xffff88810180b100 (size 96): comm "syz-executor133", pid 3619, jiffies 4294945714 (age 12.690s) hex dump (first 32 bytes): 28 64 23 02 81 88 ff ff 28 64 23 02 81 88 ff ff (d#.....(d#..... 90 a8 aa 83 ff ff ff ff 00 00 b5 0f 81 88 ff ff ................ backtrace: [<ffffffff83a8c59b>] kmalloc include/linux/slab.h:600 [inline] [<ffffffff83a8c59b>] nftnetdevhookalloc+0x3b/0xc0 net/netfilter/nftablesapi.c:1901 [<ffffffff83a9239a>] nftchainparsenetdev net/netfilter/nftablesapi.c:1998 [inline] [<ffffffff83a9239a>] nftchainparsehook+0x33a/0x530 net/netfilter/nftablesapi.c:2073 [<ffffffff83a9b14b>] nftablesaddchain.constprop.0+0x10b/0x950 net/netfilter/nftablesapi.c:2218 [<ffffffff83a9c41b>] nftablesnewchain+0xa8b/0xc60 net/netfilter/nftablesapi.c:2593 [<ffffffff83a3d6a6>] nfnetlinkrcvbatch+0xa46/0xd20 net/netfilter/nfnetlink.c:517 [<ffffffff83a3db79>] nfnetlinkrcvskbbatch net/netfilter/nfnetlink.c:638 [inline] [<ffffffff83a3db79>] nfnetlinkrcv+0x1f9/0x220 net/netfilter/nfnetlink.c:656 [<ffffffff83a13b17>] netlinkunicastkernel net/netlink/afnetlink.c:1319 [inline] [<ffffffff83a13b17>] netlinkunicast+0x397/0x4c0 net/netlink/afnetlink.c:1345 [<ffffffff83a13fd6>] netlinksendmsg+0x396/0x710 net/netlink/afnetlink.c:1921 [<ffffffff83865ab6>] socksendmsgnosec net/socket.c:714 [inline] [<ffffffff83865ab6>] sock_sendmsg+0x56/0x80 net/socket.c:734 [<ffffffff8386601c>] ____sys_sendmsg+0x36c/0x390 net/socket.c:2482 [<ffffffff8386a918>] ___sys_sendmsg+0xa8/0x110 net/socket.c:2536 [<ffffffff8386aaa8>] _syssendmsg+0x88/0x100 net/socket.c:2565 [<ffffffff845e5955>] dosyscallx64 arch/x86/entry/common.c:50 [inline] [<ffffffff845e5955>] dosyscall64+0x35/0xb0 arch/x86/entry/common.c:80 [<ffffffff84800087>] entrySYSCALL64afterhwframe+0x63/0xcd

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/48xxx/CVE-2022-48691.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
d54725cd11a57c30f650260cfb0a92c268bdc3e0
Fixed
910891a2a44cdc49efcc4fe7459c1085ba00d0f4
Fixed
1ce55ec5cb7c573c983dffbe290b8d17caf1f157
Fixed
94ed8eeb8d9aeb00e4f4e19b83a2e28b6442fbc5
Fixed
77972a36ecc4db7fc7c68f0e80714263c5f03f65

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48691.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.143
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.68
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
5.19.9

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48691.json"