vulnerability
Arch Linux: Access of Uninitialized Pointer (CVE-2022-1016)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:L/AC:L/Au:S/C:C/I:N/A:N) | Aug 29, 2022 | Jul 11, 2025 | Feb 12, 2026 |
Severity
5
CVSS
(AV:L/AC:L/Au:S/C:C/I:N/A:N)
Published
Aug 29, 2022
Added
Jul 11, 2025
Modified
Feb 12, 2026
Description
CVE-2022-1016 pertains to uninitialized stack data in the nft_do_chain routine. CVE-2022-1016 is exploitable starting from commit 96518518cc41 (original merge of nf_tables), v3.13-rc1, and has been fixed in commit 4c905f6740a3 ("netfilter: nf_tables: initialize registers in nft_do_chain()").
Solution
arch-linux-upgrade-latest
References
- CVE-2022-1016
- https://attackerkb.com/topics/CVE-2022-1016
- URL-http://blog.dbouman.nl/2022/04/02/How-The-Tables-Have-Turned-CVE-2022-1015-1016/
- URL-https://access.redhat.com/security/cve/CVE-2022-1016
- URL-https://bugzilla.redhat.com/show_bug.cgi?id=2066614
- URL-https://seclists.org/oss-sec/2022/q1/205
- CWE-824
- CWE-909
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.