CVE-2022-49293

In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: initialize registers in nft_do_chain() Initialize registers to avoid stack leak into userspace.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.17:*:*:*:*:*:*:*

History

21 Oct 2025, 11:46

Type Values Removed Values Added
First Time Linux
Linux linux Kernel
CPE cpe:2.3:o:linux:linux_kernel:5.17:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE NVD-CWE-noinfo
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: netfilter: nf_tables: inicializar registros en nft_do_chain() Inicializar registros para evitar fugas de pila en el espacio de usuario.
References () https://git.kernel.org/stable/c/06f0ff82c70241a766a811ae1acf07d6e2734dcb - () https://git.kernel.org/stable/c/06f0ff82c70241a766a811ae1acf07d6e2734dcb - Patch
References () https://git.kernel.org/stable/c/2c74374c2e88c7b7992bf808d9f9391f7452f9d9 - () https://git.kernel.org/stable/c/2c74374c2e88c7b7992bf808d9f9391f7452f9d9 - Patch
References () https://git.kernel.org/stable/c/4c905f6740a365464e91467aa50916555b28213d - () https://git.kernel.org/stable/c/4c905f6740a365464e91467aa50916555b28213d - Patch
References () https://git.kernel.org/stable/c/4d28522acd1c4415c85f6b33463713a268f68965 - () https://git.kernel.org/stable/c/4d28522acd1c4415c85f6b33463713a268f68965 - Patch
References () https://git.kernel.org/stable/c/64f24c76dd0ce53d0fa3a0bfb9aeea507c769485 - () https://git.kernel.org/stable/c/64f24c76dd0ce53d0fa3a0bfb9aeea507c769485 - Patch
References () https://git.kernel.org/stable/c/88791b79a1eb2ba94e95d039243e28433583a67b - () https://git.kernel.org/stable/c/88791b79a1eb2ba94e95d039243e28433583a67b - Patch
References () https://git.kernel.org/stable/c/a3cc32863b175168283cb0a5fde08de6a1e27df9 - () https://git.kernel.org/stable/c/a3cc32863b175168283cb0a5fde08de6a1e27df9 - Patch
References () https://git.kernel.org/stable/c/dd03640529204ef4b8189fbdea08217d8d98271f - () https://git.kernel.org/stable/c/dd03640529204ef4b8189fbdea08217d8d98271f - Patch
References () https://git.kernel.org/stable/c/fafb904156fbb8f1dd34970cd5223e00b47c33be - () https://git.kernel.org/stable/c/fafb904156fbb8f1dd34970cd5223e00b47c33be - Patch

26 Feb 2025, 07:01

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-26 07:01

Updated : 2025-10-21 11:46


NVD link : CVE-2022-49293

Mitre link : CVE-2022-49293

CVE.ORG link : CVE-2022-49293


JSON object : View

Products Affected

linux

  • linux_kernel