CVE-2022-48691

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-48691
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-48691.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-48691
Related
Published
2024-05-03T15:15:07Z
Modified
2024-10-30T17:46:14.772578Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: clean up hook list when offload flags check fails

splice back the hook list so nftchainrelease_hook() has a chance to release the hooks.

BUG: memory leak unreferenced object 0xffff88810180b100 (size 96): comm "syz-executor133", pid 3619, jiffies 4294945714 (age 12.690s) hex dump (first 32 bytes): 28 64 23 02 81 88 ff ff 28 64 23 02 81 88 ff ff (d#.....(d#..... 90 a8 aa 83 ff ff ff ff 00 00 b5 0f 81 88 ff ff ................ backtrace: [<ffffffff83a8c59b>] kmalloc include/linux/slab.h:600 [inline] [<ffffffff83a8c59b>] nftnetdevhookalloc+0x3b/0xc0 net/netfilter/nftablesapi.c:1901 [<ffffffff83a9239a>] nftchainparsenetdev net/netfilter/nftablesapi.c:1998 [inline] [<ffffffff83a9239a>] nftchainparsehook+0x33a/0x530 net/netfilter/nftablesapi.c:2073 [<ffffffff83a9b14b>] nftablesaddchain.constprop.0+0x10b/0x950 net/netfilter/nftablesapi.c:2218 [<ffffffff83a9c41b>] nftablesnewchain+0xa8b/0xc60 net/netfilter/nftablesapi.c:2593 [<ffffffff83a3d6a6>] nfnetlinkrcvbatch+0xa46/0xd20 net/netfilter/nfnetlink.c:517 [<ffffffff83a3db79>] nfnetlinkrcvskbbatch net/netfilter/nfnetlink.c:638 [inline] [<ffffffff83a3db79>] nfnetlinkrcv+0x1f9/0x220 net/netfilter/nfnetlink.c:656 [<ffffffff83a13b17>] netlinkunicastkernel net/netlink/afnetlink.c:1319 [inline] [<ffffffff83a13b17>] netlinkunicast+0x397/0x4c0 net/netlink/afnetlink.c:1345 [<ffffffff83a13fd6>] netlinksendmsg+0x396/0x710 net/netlink/afnetlink.c:1921 [<ffffffff83865ab6>] socksendmsgnosec net/socket.c:714 [inline] [<ffffffff83865ab6>] socksendmsg+0x56/0x80 net/socket.c:734 [<ffffffff8386601c>] syssendmsg+0x36c/0x390 net/socket.c:2482 [<ffffffff8386a918>] syssendmsg+0xa8/0x110 net/socket.c:2536 [<ffffffff8386aaa8>] _syssendmsg+0x88/0x100 net/socket.c:2565 [<ffffffff845e5955>] dosyscallx64 arch/x86/entry/common.c:50 [inline] [<ffffffff845e5955>] dosyscall64+0x35/0xb0 arch/x86/entry/common.c:80 [<ffffffff84800087>] entrySYSCALL64afterhwframe+0x63/0xcd

References

Affected packages

Debian:11 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.10.148-1

Affected versions

5.*

5.10.46-4
5.10.46-5
5.10.70-1~bpo10+1
5.10.70-1
5.10.84-1
5.10.92-1~bpo10+1
5.10.92-1
5.10.92-2
5.10.103-1~bpo10+1
5.10.103-1
5.10.106-1
5.10.113-1
5.10.120-1~bpo10+1
5.10.120-1
5.10.127-1
5.10.127-2~bpo10+1
5.10.127-2
5.10.136-1
5.10.140-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.19.11-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.19.11-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}