CVE-2022-50213

In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: do not allow SET_ID to refer to another table When doing lookups for sets on the same batch by using its ID, a set from a different table can be used. Then, when the table is removed, a reference to the set may be kept after the set is freed, leading to a potential use-after-free. When looking for sets by ID, use the table that was used for the lookup by name, and only return sets belonging to that same table. This fixes CVE-2022-2586, also reported as ZDI-CAN-17470.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

19 Nov 2025, 13:00

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: netfilter: nf_tables: no permitir que SET_ID haga referencia a otra tabla. Al buscar conjuntos en el mismo lote usando su ID, se puede usar un conjunto de una tabla diferente. Al eliminar la tabla, es posible que se conserve una referencia al conjunto después de liberarlo, lo que puede provocar un error de Use-After-Free. Al buscar conjuntos por ID, se debe usar la tabla utilizada para la búsqueda por nombre y devolver solo los conjuntos que pertenecen a esa misma tabla. Esto corrige CVE-2022-2586, también reportado como ZDI-CAN-17470.
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CWE CWE-416
First Time Linux
Linux linux Kernel
References () https://git.kernel.org/stable/c/0d07039397527361850c554c192e749cfc879ea9 - () https://git.kernel.org/stable/c/0d07039397527361850c554c192e749cfc879ea9 - Patch
References () https://git.kernel.org/stable/c/1a4b18b1ff11ba26f9a852019d674fde9d1d1cff - () https://git.kernel.org/stable/c/1a4b18b1ff11ba26f9a852019d674fde9d1d1cff - Patch
References () https://git.kernel.org/stable/c/470ee20e069a6d05ae549f7d0ef2bdbcee6a81b2 - () https://git.kernel.org/stable/c/470ee20e069a6d05ae549f7d0ef2bdbcee6a81b2 - Patch
References () https://git.kernel.org/stable/c/77d3b5038b7462318f5183e2ad704b01d57215a2 - () https://git.kernel.org/stable/c/77d3b5038b7462318f5183e2ad704b01d57215a2 - Patch
References () https://git.kernel.org/stable/c/f4fa03410f7c5f5bd8f90e9c11e9a8c4b526ff6f - () https://git.kernel.org/stable/c/f4fa03410f7c5f5bd8f90e9c11e9a8c4b526ff6f - Patch
References () https://git.kernel.org/stable/c/faafd9286f1355c76fe9ac3021c280297213330e - () https://git.kernel.org/stable/c/faafd9286f1355c76fe9ac3021c280297213330e - Patch
References () https://git.kernel.org/stable/c/fab2f61cc3b0e441b1749f017cfee75f9bbaded7 - () https://git.kernel.org/stable/c/fab2f61cc3b0e441b1749f017cfee75f9bbaded7 - Patch
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

18 Jun 2025, 11:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-18 11:15

Updated : 2025-11-19 13:00


NVD link : CVE-2022-50213

Mitre link : CVE-2022-50213

CVE.ORG link : CVE-2022-50213


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free