๐Ÿ” CVE Alert

CVE-2022-48911

UNKNOWN 0.0

netfilter: nf_queue: fix possible use-after-free

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_queue: fix possible use-after-free Eric Dumazet says: The sock_hold() side seems suspect, because there is no guarantee that sk_refcnt is not already 0. On failure, we cannot queue the packet and need to indicate an error. The packet will be dropped by the caller. v2: split skb prefetch hunk into separate change

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Aug 22, 2024
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
271b72c7fa82c2c7a795bc16896149933110672d < 21b27b2baa27423286e9b8d3f0b194d587083d95 271b72c7fa82c2c7a795bc16896149933110672d < ef97921ccdc243170fcef857ba2a17cf697aece5 271b72c7fa82c2c7a795bc16896149933110672d < 34dc4a6a7f261736ef7183868a5bddad31c7f9e3 271b72c7fa82c2c7a795bc16896149933110672d < 43c25da41e3091b31a906651a43e80a2719aa1ff 271b72c7fa82c2c7a795bc16896149933110672d < 4d05239203fa38ea8a6f31e228460da4cb17a71a 271b72c7fa82c2c7a795bc16896149933110672d < dd648bd1b33a828f62befa696b206c688da0ec43 271b72c7fa82c2c7a795bc16896149933110672d < dcc3cb920bf7ba66ac5e9272293a9ba5f80917ee 271b72c7fa82c2c7a795bc16896149933110672d < c3873070247d9e3c7a6b0cf9bf9b45e8018427b1
Linux / Linux
2.6.29

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/21b27b2baa27423286e9b8d3f0b194d587083d95 git.kernel.org: https://git.kernel.org/stable/c/ef97921ccdc243170fcef857ba2a17cf697aece5 git.kernel.org: https://git.kernel.org/stable/c/34dc4a6a7f261736ef7183868a5bddad31c7f9e3 git.kernel.org: https://git.kernel.org/stable/c/43c25da41e3091b31a906651a43e80a2719aa1ff git.kernel.org: https://git.kernel.org/stable/c/4d05239203fa38ea8a6f31e228460da4cb17a71a git.kernel.org: https://git.kernel.org/stable/c/dd648bd1b33a828f62befa696b206c688da0ec43 git.kernel.org: https://git.kernel.org/stable/c/dcc3cb920bf7ba66ac5e9272293a9ba5f80917ee git.kernel.org: https://git.kernel.org/stable/c/c3873070247d9e3c7a6b0cf9bf9b45e8018427b1