CVE-2022-50048

In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: possible module reference underflow in error path dst->ops is set on when nft_expr_clone() fails, but module refcount has not been bumped yet, therefore nft_expr_destroy() leads to module reference underflow.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.0:rc1:*:*:*:*:*:*

History

13 Nov 2025, 18:40

Type Values Removed Values Added
CWE NVD-CWE-noinfo
References () https://git.kernel.org/stable/c/1e52e6cfec6342c3d0df47dc3a76724fb3dabf56 - () https://git.kernel.org/stable/c/1e52e6cfec6342c3d0df47dc3a76724fb3dabf56 - Patch
References () https://git.kernel.org/stable/c/b59bee8b05b0e789b5a298cacb09e8aaa3367a29 - () https://git.kernel.org/stable/c/b59bee8b05b0e789b5a298cacb09e8aaa3367a29 - Patch
References () https://git.kernel.org/stable/c/c485c35ff6783ccd12c160fcac6a0e504e83e0bf - () https://git.kernel.org/stable/c/c485c35ff6783ccd12c160fcac6a0e504e83e0bf - Patch
First Time Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:6.0:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: netfilter: nf_tables: posible desbordamiento de referencia de módulo en la ruta de error dst->ops está activado cuando nft_expr_clone() falla, pero el recuento de referencias del módulo aún no se ha incrementado, por lo tanto, nft_expr_destroy() provoca un desbordamiento de referencia de módulo.

18 Jun 2025, 11:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-18 11:15

Updated : 2025-11-13 18:40


NVD link : CVE-2022-50048

Mitre link : CVE-2022-50048

CVE.ORG link : CVE-2022-50048


JSON object : View

Products Affected

linux

  • linux_kernel