CVE-2022-49919
01.05.2025, 15:16
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: release flow rule object from commit path No need to postpone this to the commit release path, since no packets are walking over this object, this is accessed from control plane only. This helped uncovered UAF triggered by races with the netlink notifier.
Vendor | Product | Version |
---|---|---|
linux | linux_kernel | 5.4.198 ≤ 𝑥 < 5.4.224 |
linux | linux_kernel | 5.10.122 ≤ 𝑥 < 5.10.154 |
linux | linux_kernel | 5.15.47 ≤ 𝑥 < 5.15.78 |
linux | linux_kernel | 5.17.15 ≤ 𝑥 < 5.18 |
linux | linux_kernel | 5.18.4 ≤ 𝑥 < 6.0.8 |
linux | linux_kernel | 6.1:rc1 |
linux | linux_kernel | 6.1:rc2 |
linux | linux_kernel | 6.1:rc3 |
𝑥
= Vulnerable software versions

Debian Releases
Common Weakness Enumeration
- CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')The program contains a code sequence that can run concurrently with other code, and the code sequence requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence that is operating concurrently.
- CWE-416 - Use After FreeReferencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
References