We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2022-50048

netfilter: nf_tables: possible module reference underflow in error path



Description

In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: possible module reference underflow in error path dst->ops is set on when nft_expr_clone() fails, but module refcount has not been bumped yet, therefore nft_expr_destroy() leads to module reference underflow.

Reserved 2025-06-18 | Published 2025-06-18 | Updated 2025-06-18 | Assigner Linux

Product status

Default status
unaffected

8cfd9b0f8515e7c361bba27e2a2684cbd427fe01 before b59bee8b05b0e789b5a298cacb09e8aaa3367a29
affected

8cfd9b0f8515e7c361bba27e2a2684cbd427fe01 before 1e52e6cfec6342c3d0df47dc3a76724fb3dabf56
affected

8cfd9b0f8515e7c361bba27e2a2684cbd427fe01 before c485c35ff6783ccd12c160fcac6a0e504e83e0bf
affected

Default status
affected

5.11
affected

Any version before 5.11
unaffected

5.15.63
unaffected

5.19.4
unaffected

6.0
unaffected

References

git.kernel.org/...c/b59bee8b05b0e789b5a298cacb09e8aaa3367a29

git.kernel.org/...c/1e52e6cfec6342c3d0df47dc3a76724fb3dabf56

git.kernel.org/...c/c485c35ff6783ccd12c160fcac6a0e504e83e0bf

cve.org (CVE-2022-50048)

nvd.nist.gov (CVE-2022-50048)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2022-50048

Support options

Helpdesk Chat, Email, Knowledgebase