{"id":"CVE-2022-48911","summary":"netfilter: nf_queue: fix possible use-after-free","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_queue: fix possible use-after-free\n\nEric Dumazet says:\n  The sock_hold() side seems suspect, because there is no guarantee\n  that sk_refcnt is not already 0.\n\nOn failure, we cannot queue the packet and need to indicate an\nerror.  The packet will be dropped by the caller.\n\nv2: split skb prefetch hunk into separate change","modified":"2026-04-02T08:27:08.278808Z","published":"2024-08-22T01:31:07.463Z","related":["SUSE-SU-2024:3547-1","SUSE-SU-2024:3559-1","SUSE-SU-2024:3563-1","SUSE-SU-2024:3565-1","SUSE-SU-2024:3566-1","SUSE-SU-2024:3567-1","SUSE-SU-2024:3569-1","SUSE-SU-2024:3585-1","SUSE-SU-2024:3587-1","SUSE-SU-2024:3591-1","SUSE-SU-2024:3592-1","SUSE-SU-2025:0892-1","SUSE-SU-2025:0893-1","SUSE-SU-2025:0897-1","SUSE-SU-2025:0898-1","SUSE-SU-2025:0903-1","SUSE-SU-2025:0904-1","SUSE-SU-2025:0906-1","SUSE-SU-2025:0908-1","SUSE-SU-2025:0916-1","SUSE-SU-2025:0917-1","SUSE-SU-2025:0920-1","SUSE-SU-2025:0927-1","SUSE-SU-2025:0942-1","SUSE-SU-2025:0943-1","SUSE-SU-2025:0944-1","SUSE-SU-2025:0950-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/48xxx/CVE-2022-48911.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/21b27b2baa27423286e9b8d3f0b194d587083d95"},{"type":"WEB","url":"https://git.kernel.org/stable/c/34dc4a6a7f261736ef7183868a5bddad31c7f9e3"},{"type":"WEB","url":"https://git.kernel.org/stable/c/43c25da41e3091b31a906651a43e80a2719aa1ff"},{"type":"WEB","url":"https://git.kernel.org/stable/c/4d05239203fa38ea8a6f31e228460da4cb17a71a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c3873070247d9e3c7a6b0cf9bf9b45e8018427b1"},{"type":"WEB","url":"https://git.kernel.org/stable/c/dcc3cb920bf7ba66ac5e9272293a9ba5f80917ee"},{"type":"WEB","url":"https://git.kernel.org/stable/c/dd648bd1b33a828f62befa696b206c688da0ec43"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ef97921ccdc243170fcef857ba2a17cf697aece5"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/48xxx/CVE-2022-48911.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-48911"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"271b72c7fa82c2c7a795bc16896149933110672d"},{"fixed":"21b27b2baa27423286e9b8d3f0b194d587083d95"},{"fixed":"ef97921ccdc243170fcef857ba2a17cf697aece5"},{"fixed":"34dc4a6a7f261736ef7183868a5bddad31c7f9e3"},{"fixed":"43c25da41e3091b31a906651a43e80a2719aa1ff"},{"fixed":"4d05239203fa38ea8a6f31e228460da4cb17a71a"},{"fixed":"dd648bd1b33a828f62befa696b206c688da0ec43"},{"fixed":"dcc3cb920bf7ba66ac5e9272293a9ba5f80917ee"},{"fixed":"c3873070247d9e3c7a6b0cf9bf9b45e8018427b1"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-48911.json"}}],"schema_version":"1.7.5"}