
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-49561 affects the Linux kernel's netfilter conntrack subsystem. The vulnerability was discovered in the connection tracking functionality where a race condition could occur during conntrack insertion. This issue was introduced by two previous changes: the clash resolution on insertion race (71d8c47fc653) and immediate extension area freeing (2ad9d7747c10) (Kernel Git).
The vulnerability occurs when a conntrack is clashing during insertion, which can free skb->_nfct and set it to an already-confirmed entry. The issue wasn't detected earlier because the conntrack entry and extension space were previously freed after an RCU grace period. The bug only manifests when events are enabled, making it a timing-dependent issue (Kernel Git).
When triggered, this vulnerability could lead to incorrect connection tracking behavior in the Linux kernel's netfilter subsystem, potentially affecting network packet filtering and connection state management (Kernel Git).
The issue was fixed by re-fetching the conntrack after insertion. The patch modifies nfconntrackconfirm() to update the conntrack pointer after a successful insertion, ensuring the correct reference is used for subsequent operations (Kernel Git).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."