CVE-2022-48911
Linux Kernel vulnerability analysis and mitigation

Overview

CVE-2022-48911 is a use-after-free vulnerability discovered in the Linux kernel's netfilter component, specifically in the nfqueue functionality. The vulnerability was disclosed and patched in early 2022, affecting Linux kernel versions from 2.6.29 up to versions before 5.17-rc6. This security issue was identified in the netfilter's nfqueue mechanism where there was no guarantee that the socket reference count (sk_refcnt) was not already 0 when attempting to hold a socket reference (Kernel Patch).

Technical details

The vulnerability exists in the socket handling mechanism of the netfilter's nfqueue component. The issue stems from the sockhold() operation, where there was no verification that sk_refcnt (socket reference count) was not already 0. The CVSS v3.1 base score for this vulnerability is 5.5 (Medium), with the vector string CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H. The vulnerability is classified as CWE-416 (Use After Free) (NVD).

Impact

The vulnerability could lead to a use-after-free condition in the Linux kernel's netfilter subsystem. When exploited, this could potentially result in system crashes or denial of service conditions. The impact is primarily focused on system availability, as indicated by the CVSS metrics showing no impact on confidentiality or integrity, but high impact on availability (NVD).

Mitigation and workarounds

The vulnerability has been patched in the Linux kernel. The fix involves modifying the nfqueueentrygetrefs function to check the socket reference count before incrementing it, and properly handling the failure case by returning an error when the reference cannot be obtained. The patch ensures that packets are properly dropped by the caller when the reference acquisition fails (Kernel Patch).

Additional resources


SourceThis report was generated using AI

Related Linux Kernel vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-40344N/AN/A
  • Linux KernelLinux Kernel
  • kernel-debug-modules-internal
NoYesDec 09, 2025
CVE-2025-40343N/AN/A
  • Linux KernelLinux Kernel
  • kernel-64k-debug-devel
NoYesDec 09, 2025
CVE-2025-40342N/AN/A
  • Linux KernelLinux Kernel
  • kernel-64k-debug-devel-matched
NoYesDec 09, 2025
CVE-2025-40341N/AN/A
  • Linux KernelLinux Kernel
  • kernel-rt-64k-debug-modules-extra
NoYesDec 09, 2025
CVE-2025-40340N/AN/A
  • Linux KernelLinux Kernel
  • kernel-rt-64k-debug-kvm
NoYesDec 09, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management