{"id":"CVE-2022-48933","summary":"netfilter: nf_tables: fix memory leak during stateful obj update","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: fix memory leak during stateful obj update\n\nstateful objects can be updated from the control plane.\nThe transaction logic allocates a temporary object for this purpose.\n\nThe -\u003einit function was called for this object, so plain kfree() leaks\nresources. We must call -\u003edestroy function of the object.\n\nnft_obj_destroy does this, but it also decrements the module refcount,\nbut the update path doesn't increment it.\n\nTo avoid special-casing the update object release, do module_get for\nthe update case too and release it via nft_obj_destroy().","modified":"2026-04-02T08:27:10.137427Z","published":"2024-08-22T03:31:27.165Z","related":["SUSE-SU-2024:3225-1","SUSE-SU-2024:3249-1","SUSE-SU-2025:01620-1","SUSE-SU-2025:01640-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/48xxx/CVE-2022-48933.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/34bb90e407e3288f610558beaae54ecaa32b11c4"},{"type":"WEB","url":"https://git.kernel.org/stable/c/53026346a94c43f35c32b18804041bc483271d87"},{"type":"WEB","url":"https://git.kernel.org/stable/c/7e9880e81d3fd6a43c202f205717485290432826"},{"type":"WEB","url":"https://git.kernel.org/stable/c/dad3bdeef45f81a6e90204bcc85360bb76eccec7"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e96e204ee6fa46702f6c94c3c69a09e69e0eac52"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/48xxx/CVE-2022-48933.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-48933"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"d62d0ba97b5803183e70cfded7f7b9da76893bf5"},{"fixed":"53026346a94c43f35c32b18804041bc483271d87"},{"fixed":"7e9880e81d3fd6a43c202f205717485290432826"},{"fixed":"e96e204ee6fa46702f6c94c3c69a09e69e0eac52"},{"fixed":"34bb90e407e3288f610558beaae54ecaa32b11c4"},{"fixed":"dad3bdeef45f81a6e90204bcc85360bb76eccec7"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-48933.json"}}],"schema_version":"1.7.5"}