We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: do not allow SET_ID to refer to another table When doing lookups for sets on the same batch by using its ID, a set from a different table can be used. Then, when the table is removed, a reference to the set may be kept after the set is freed, leading to a potential use-after-free. When looking for sets by ID, use the table that was used for the lookup by name, and only return sets belonging to that same table. This fixes CVE-2022-2586, also reported as ZDI-CAN-17470.
Reserved 2025-06-18 | Published 2025-06-18 | Updated 2025-06-18 | Assigner Linuxgit.kernel.org/...c/77d3b5038b7462318f5183e2ad704b01d57215a2
git.kernel.org/...c/fab2f61cc3b0e441b1749f017cfee75f9bbaded7
git.kernel.org/...c/1a4b18b1ff11ba26f9a852019d674fde9d1d1cff
git.kernel.org/...c/faafd9286f1355c76fe9ac3021c280297213330e
git.kernel.org/...c/f4fa03410f7c5f5bd8f90e9c11e9a8c4b526ff6f
git.kernel.org/...c/0d07039397527361850c554c192e749cfc879ea9
git.kernel.org/...c/470ee20e069a6d05ae549f7d0ef2bdbcee6a81b2
Support options