vulnerability
Ubuntu: (CVE-2022-50213): linux vulnerability
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 6 | (AV:L/AC:L/Au:S/C:C/I:N/A:C) | Jun 18, 2025 | Jun 26, 2025 | Nov 20, 2025 |
Severity
6
CVSS
(AV:L/AC:L/Au:S/C:C/I:N/A:C)
Published
Jun 18, 2025
Added
Jun 26, 2025
Modified
Nov 20, 2025
Description
In the Linux kernel, the following vulnerability has been resolved:
netfilter: nf_tables: do not allow SET_ID to refer to another table
When doing lookups for sets on the same batch by using its ID, a set from a
different table can be used.
Then, when the table is removed, a reference to the set may be kept after
the set is freed, leading to a potential use-after-free.
When looking for sets by ID, use the table that was used for the lookup by
name, and only return sets belonging to that same table.
This fixes CVE-2022-2586, also reported as ZDI-CAN-17470.
Solution
no-fix-ubuntu-package
References
- CVE-2022-50213
- https://attackerkb.com/topics/CVE-2022-50213
- CWE-416
- URL-https://git.kernel.org/stable/c/0d07039397527361850c554c192e749cfc879ea9
- URL-https://git.kernel.org/stable/c/1a4b18b1ff11ba26f9a852019d674fde9d1d1cff
- URL-https://git.kernel.org/stable/c/470ee20e069a6d05ae549f7d0ef2bdbcee6a81b2
- URL-https://git.kernel.org/stable/c/77d3b5038b7462318f5183e2ad704b01d57215a2
- URL-https://git.kernel.org/stable/c/f4fa03410f7c5f5bd8f90e9c11e9a8c4b526ff6f
- URL-https://git.kernel.org/stable/c/faafd9286f1355c76fe9ac3021c280297213330e
- URL-https://git.kernel.org/stable/c/fab2f61cc3b0e441b1749f017cfee75f9bbaded7
- URL-https://www.cve.org/CVERecord?id=CVE-2022-50213
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.