SB2024082214 - Use-after-free in Linux kernel net netfilter
Published: August 22, 2024 Updated: May 12, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Use-after-free (CVE-ID: CVE-2022-48911)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the nf_queue_entry_dup() function in net/netfilter/nfnetlink_queue.c, within the nf_queue_entry_release_refs(), nf_queue_entry_get_refs() and __nf_queue() functions in net/netfilter/nf_queue.c. A local user can escalate privileges on the system.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/21b27b2baa27423286e9b8d3f0b194d587083d95
- https://git.kernel.org/stable/c/ef97921ccdc243170fcef857ba2a17cf697aece5
- https://git.kernel.org/stable/c/34dc4a6a7f261736ef7183868a5bddad31c7f9e3
- https://git.kernel.org/stable/c/43c25da41e3091b31a906651a43e80a2719aa1ff
- https://git.kernel.org/stable/c/4d05239203fa38ea8a6f31e228460da4cb17a71a
- https://git.kernel.org/stable/c/dd648bd1b33a828f62befa696b206c688da0ec43
- https://git.kernel.org/stable/c/dcc3cb920bf7ba66ac5e9272293a9ba5f80917ee
- https://git.kernel.org/stable/c/c3873070247d9e3c7a6b0cf9bf9b45e8018427b1
- https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.270
- https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.233
- https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.305
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.104
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.27
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.13
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.183