CVE-2022-49561

In the Linux kernel, the following vulnerability has been resolved: netfilter: conntrack: re-fetch conntrack after insertion In case the conntrack is clashing, insertion can free skb->_nfct and set skb->_nfct to the already-confirmed entry. This wasn't found before because the conntrack entry and the extension space used to free'd after an rcu grace period, plus the race needs events enabled to trigger.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

24 Oct 2025, 15:50

Type Values Removed Values Added
CWE NVD-CWE-noinfo
First Time Linux
Linux linux Kernel
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: netfilter: conntrack: volver a obtener conntrack después de la inserción En caso de que conntrack esté en conflicto, la inserción puede liberar skb->_nfct y establecer skb->_nfct en la entrada ya confirmada. Esto no se encontró antes porque la entrada conntrack y el espacio de extensión solían liberarse después de un período de gracia de rcu, además de que la ejecución necesita eventos habilitados para activarse.
References () https://git.kernel.org/stable/c/01989d7eebb61c99bd4b88ebc8e261bd2f02caed - () https://git.kernel.org/stable/c/01989d7eebb61c99bd4b88ebc8e261bd2f02caed - Patch
References () https://git.kernel.org/stable/c/04e4a11dc723c52db7a36dc58f0d69ce6426f8f0 - () https://git.kernel.org/stable/c/04e4a11dc723c52db7a36dc58f0d69ce6426f8f0 - Patch
References () https://git.kernel.org/stable/c/04f9e9104c969d8ce10a4a43634f641ed082092d - () https://git.kernel.org/stable/c/04f9e9104c969d8ce10a4a43634f641ed082092d - Patch
References () https://git.kernel.org/stable/c/56b14ecec97f39118bf85c9ac2438c5a949509ed - () https://git.kernel.org/stable/c/56b14ecec97f39118bf85c9ac2438c5a949509ed - Patch
References () https://git.kernel.org/stable/c/91a36ec160ec1a0c8f5352b772dffcbb0b6023e3 - () https://git.kernel.org/stable/c/91a36ec160ec1a0c8f5352b772dffcbb0b6023e3 - Patch
References () https://git.kernel.org/stable/c/92a999d1963eed0df666284e20055136ceabd12f - () https://git.kernel.org/stable/c/92a999d1963eed0df666284e20055136ceabd12f - Patch
References () https://git.kernel.org/stable/c/b16bb373988da3ceb0308381634117e18b6ec60d - () https://git.kernel.org/stable/c/b16bb373988da3ceb0308381634117e18b6ec60d - Patch
References () https://git.kernel.org/stable/c/e97222b785e70e8973281666d709baad6523d8af - () https://git.kernel.org/stable/c/e97222b785e70e8973281666d709baad6523d8af - Patch
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5

26 Feb 2025, 07:01

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-26 07:01

Updated : 2025-10-24 15:50


NVD link : CVE-2022-49561

Mitre link : CVE-2022-49561

CVE.ORG link : CVE-2022-49561


JSON object : View

Products Affected

linux

  • linux_kernel