In the Linux kernel, the following vulnerability has been resolved:
netfilter: nf_tables: possible module reference underflow in error path
dst->ops is set on when nft_expr_clone() fails, but module refcount has
not been bumped yet, therefore nft_expr_destroy() leads to module
reference underflow.
References
Configurations
Configuration 1 (hide)
|
History
13 Nov 2025, 18:40
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | NVD-CWE-noinfo | |
| References | () https://git.kernel.org/stable/c/1e52e6cfec6342c3d0df47dc3a76724fb3dabf56 - Patch | |
| References | () https://git.kernel.org/stable/c/b59bee8b05b0e789b5a298cacb09e8aaa3367a29 - Patch | |
| References | () https://git.kernel.org/stable/c/c485c35ff6783ccd12c160fcac6a0e504e83e0bf - Patch | |
| First Time |
Linux
Linux linux Kernel |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| CPE | cpe:2.3:o:linux:linux_kernel:6.0:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
|
| Summary |
|
18 Jun 2025, 11:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-06-18 11:15
Updated : 2025-11-13 18:40
NVD link : CVE-2022-50048
Mitre link : CVE-2022-50048
CVE.ORG link : CVE-2022-50048
JSON object : View
Products Affected
linux
- linux_kernel
CWE
