In the Linux kernel, the following vulnerability has been resolved:
netfilter: nf_tables: do not allow SET_ID to refer to another table
When doing lookups for sets on the same batch by using its ID, a set from a
different table can be used.
Then, when the table is removed, a reference to the set may be kept after
the set is freed, leading to a potential use-after-free.
When looking for sets by ID, use the table that was used for the lookup by
name, and only return sets belonging to that same table.
This fixes CVE-2022-2586, also reported as ZDI-CAN-17470.
References
Configurations
Configuration 1 (hide)
|
History
19 Nov 2025, 13:00
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://git.kernel.org/stable/c/0d07039397527361850c554c192e749cfc879ea9 - Patch | |
| References | () https://git.kernel.org/stable/c/1a4b18b1ff11ba26f9a852019d674fde9d1d1cff - Patch | |
| References | () https://git.kernel.org/stable/c/470ee20e069a6d05ae549f7d0ef2bdbcee6a81b2 - Patch | |
| References | () https://git.kernel.org/stable/c/77d3b5038b7462318f5183e2ad704b01d57215a2 - Patch | |
| References | () https://git.kernel.org/stable/c/f4fa03410f7c5f5bd8f90e9c11e9a8c4b526ff6f - Patch | |
| References | () https://git.kernel.org/stable/c/faafd9286f1355c76fe9ac3021c280297213330e - Patch | |
| References | () https://git.kernel.org/stable/c/fab2f61cc3b0e441b1749f017cfee75f9bbaded7 - Patch | |
| First Time |
Linux linux Kernel
Linux |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
| CWE | CWE-416 | |
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
Information
Published : 2025-06-18 11:15
Updated : 2025-11-19 13:00
NVD link : CVE-2022-50213
Mitre link : CVE-2022-50213
CVE.ORG link : CVE-2022-50213
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free
