CVE-2022-49622 Affecting kernel-abi-whitelists package, versions *


Severity

Recommended
high

Based on Red Hat Enterprise Linux security rating.

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RHEL7-KERNELABIWHITELISTS-8751061
  • published26 Feb 2025
  • disclosed26 Feb 2025

Introduced: 26 Feb 2025

NewCVE-2022-49622  (opens in a new tab)

How to fix?

There is no fixed version for RHEL:7 kernel-abi-whitelists.

NVD Description

Note: Versions mentioned in the description apply only to the upstream kernel-abi-whitelists package and not the kernel-abi-whitelists package as distributed by RHEL. See How to fix? for RHEL:7 relevant fixed versions and status.

In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: avoid skb access on nf_stolen

When verdict is NF_STOLEN, the skb might have been freed.

When tracing is enabled, this can result in a use-after-free:

  1. access to skb->nf_trace
  2. access to skb->mark
  3. computation of trace id
  4. dump of packet payload

To avoid 1, keep a cached copy of skb->nf_trace in the trace state struct. Refresh this copy whenever verdict is != STOLEN.

Avoid 2 by skipping skb->mark access if verdict is STOLEN.

3 is avoided by precomputing the trace id.

Only dump the packet when verdict is not "STOLEN".

CVSS Scores

version 3.1