๐Ÿ” CVE Alert

CVE-2022-49622

HIGH 7.8

netfilter: nf_tables: avoid skb access on nf_stolen

CVSS Score
7.8
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: avoid skb access on nf_stolen When verdict is NF_STOLEN, the skb might have been freed. When tracing is enabled, this can result in a use-after-free: 1. access to skb->nf_trace 2. access to skb->mark 3. computation of trace id 4. dump of packet payload To avoid 1, keep a cached copy of skb->nf_trace in the trace state struct. Refresh this copy whenever verdict is != STOLEN. Avoid 2 by skipping skb->mark access if verdict is STOLEN. 3 is avoided by precomputing the trace id. Only dump the packet when verdict is not "STOLEN".

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Feb 26, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new high vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
5efa0fc6d7f7930b18801f07cefae8eeacd6ac02 < 0016d5d46d7440729a3132f61a8da3bf7f84e2ba 5efa0fc6d7f7930b18801f07cefae8eeacd6ac02 < e34b9ed96ce3b06c79bf884009b16961ca478f87
Linux / Linux
4.10

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/0016d5d46d7440729a3132f61a8da3bf7f84e2ba git.kernel.org: https://git.kernel.org/stable/c/e34b9ed96ce3b06c79bf884009b16961ca478f87