
Cloud Vulnerability DB
A community-led vulnerabilities database
In the Linux kernel, a vulnerability (CVE-2022-50048) has been identified in the netfilter component, specifically in the nftables functionality. The issue involves a possible module reference underflow in the error path where dst->ops is set when nftexprclone() fails, but the module refcount has not been incremented yet, leading to a module reference underflow when nftexprdestroy() is called (NVD).
The vulnerability exists in the netfilter subsystem's nftables implementation. The core issue involves incorrect handling of module references during expression cloning operations. When the nftexprclone() function fails, it leaves the system in an inconsistent state where dst->ops is set without properly incrementing the corresponding module reference count. This leads to an underflow condition when nftexprdestroy() is subsequently called to clean up (NVD, Wiz).
The vulnerability could potentially lead to a module reference underflow in the Linux kernel's netfilter subsystem. This type of issue could affect system stability and potentially lead to denial of service conditions (Wiz).
The vulnerability has been resolved in the Linux kernel through patches that correct the module reference counting issue in the netfilter subsystem. The fix ensures proper module reference count handling during expression cloning operations (Wiz).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."