Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: netfilter: conntrack: re-fetch conntrack after insertion In case the conntrack is clashing, insertion can free skb->_nfct and set skb->_nfct to the already-confirmed entry. This wasn't found before because the conntrack entry and the extension space used to free'd after an rcu grace period, plus the race needs events enabled to trigger.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 4.7, < 4.14.282 |
References
- https://git.kernel.org/stable/c/01989d7eebb61c99bd4b88ebc8e261bd2f02caedPatch
- https://git.kernel.org/stable/c/04e4a11dc723c52db7a36dc58f0d69ce6426f8f0Patch
- https://git.kernel.org/stable/c/04f9e9104c969d8ce10a4a43634f641ed082092dPatch
- https://git.kernel.org/stable/c/56b14ecec97f39118bf85c9ac2438c5a949509edPatch
- https://git.kernel.org/stable/c/91a36ec160ec1a0c8f5352b772dffcbb0b6023e3Patch
- https://git.kernel.org/stable/c/92a999d1963eed0df666284e20055136ceabd12fPatch
- https://git.kernel.org/stable/c/b16bb373988da3ceb0308381634117e18b6ec60dPatch
- https://git.kernel.org/stable/c/e97222b785e70e8973281666d709baad6523d8afPatch
FAQ
What is CVE-2022-49561?
CVE-2022-49561 is a vulnerability with a CVSS score of 5.5 (MEDIUM). In the Linux kernel, the following vulnerability has been resolved: netfilter: conntrack: re-fetch conntrack after insertion In case the conntrack is clashing, insertion can free skb->_nfct and set ...
How severe is CVE-2022-49561?
CVE-2022-49561 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-49561?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.