In the Linux kernel, the following vulnerability has been resolved:
netfilter: nf_tables: possible module reference underflow in error path
dst->ops is set on when nftexprclone() fails, but module refcount has not been bumped yet, therefore nftexprdestroy() leads to module reference underflow.
[
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c485c35ff6783ccd12c160fcac6a0e504e83e0bf",
"id": "CVE-2022-50048-2805588a",
"deprecated": false,
"target": {
"file": "net/netfilter/nf_tables_api.c"
},
"signature_version": "v1",
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"327545146706925751354500517532087058596",
"37460846584326298250225682707864016882",
"135887754434591306839622117824220516099",
"318321731668738319083789927703285944439"
]
}
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b59bee8b05b0e789b5a298cacb09e8aaa3367a29",
"id": "CVE-2022-50048-682cf27c",
"deprecated": false,
"target": {
"file": "net/netfilter/nf_tables_api.c"
},
"signature_version": "v1",
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"327545146706925751354500517532087058596",
"37460846584326298250225682707864016882",
"135887754434591306839622117824220516099",
"318321731668738319083789927703285944439"
]
}
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b59bee8b05b0e789b5a298cacb09e8aaa3367a29",
"id": "CVE-2022-50048-7e970f38",
"deprecated": false,
"target": {
"function": "nft_set_elem_expr_clone",
"file": "net/netfilter/nf_tables_api.c"
},
"signature_version": "v1",
"signature_type": "Function",
"digest": {
"length": 526.0,
"function_hash": "107557767933528406330841000494994037593"
}
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1e52e6cfec6342c3d0df47dc3a76724fb3dabf56",
"id": "CVE-2022-50048-9bcd6b0f",
"deprecated": false,
"target": {
"function": "nft_set_elem_expr_clone",
"file": "net/netfilter/nf_tables_api.c"
},
"signature_version": "v1",
"signature_type": "Function",
"digest": {
"length": 534.0,
"function_hash": "108805007350473464965811548063496124787"
}
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1e52e6cfec6342c3d0df47dc3a76724fb3dabf56",
"id": "CVE-2022-50048-e86454dd",
"deprecated": false,
"target": {
"file": "net/netfilter/nf_tables_api.c"
},
"signature_version": "v1",
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"327545146706925751354500517532087058596",
"37460846584326298250225682707864016882",
"135887754434591306839622117824220516099",
"318321731668738319083789927703285944439"
]
}
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c485c35ff6783ccd12c160fcac6a0e504e83e0bf",
"id": "CVE-2022-50048-fab4f3bb",
"deprecated": false,
"target": {
"function": "nft_set_elem_expr_clone",
"file": "net/netfilter/nf_tables_api.c"
},
"signature_version": "v1",
"signature_type": "Function",
"digest": {
"length": 534.0,
"function_hash": "108805007350473464965811548063496124787"
}
}
]