We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2022-50043

net: fix potential refcount leak in ndisc_router_discovery()



Description

In the Linux kernel, the following vulnerability has been resolved: net: fix potential refcount leak in ndisc_router_discovery() The issue happens on specific paths in the function. After both the object `rt` and `neigh` are grabbed successfully, when `lifetime` is nonzero but the metric needs change, the function just deletes the route and set `rt` to NULL. Then, it may try grabbing `rt` and `neigh` again if above conditions hold. The function simply overwrite `neigh` if succeeds or returns if fails, without decreasing the reference count of previous `neigh`. This may result in memory leaks. Fix it by decrementing the reference count of `neigh` in place.

Reserved 2025-06-18 | Published 2025-06-18 | Updated 2025-06-18 | Assigner Linux

Product status

Default status
unaffected

6b2e04bc240fe9be9e690059f710e9f95346d34d before ffb15594433391fd7885eb88ce5a7f7bdeefbb15
affected

6b2e04bc240fe9be9e690059f710e9f95346d34d before 7998043d31d000c3a93f46182e6569dd0eecda34
affected

6b2e04bc240fe9be9e690059f710e9f95346d34d before 7396ba87f1edf549284869451665c7c4e74ecd4f
affected

Default status
affected

5.12
affected

Any version before 5.12
unaffected

5.15.63
unaffected

5.19.4
unaffected

6.0
unaffected

References

git.kernel.org/...c/ffb15594433391fd7885eb88ce5a7f7bdeefbb15

git.kernel.org/...c/7998043d31d000c3a93f46182e6569dd0eecda34

git.kernel.org/...c/7396ba87f1edf549284869451665c7c4e74ecd4f

cve.org (CVE-2022-50043)

nvd.nist.gov (CVE-2022-50043)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2022-50043

Support options

Helpdesk Chat, Email, Knowledgebase