#VU104242 Memory leak in Linux kernel - CVE-2022-49293


| Updated: 2025-05-11

Vulnerability identifier: #VU104242

Vulnerability risk: Low

CVSSv4.0: 1.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49293

CWE-ID: CWE-401

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the nft_do_chain() function in net/netfilter/nf_tables_core.c. A local user can perform a denial of service (DoS) attack.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel: 5.15, 5.15 rc1, 5.15 rc2, 5.15 rc3, 5.15 rc4, 5.15 rc5, 5.15 rc6, 5.15 rc7, 5.15.0, 5.15.1, 5.15.2, 5.15.3, 5.15.4, 5.15.5, 5.15.6, 5.15.7, 5.15.8, 5.15.9, 5.15.10, 5.15.11, 5.15.12, 5.15.13, 5.15.14, 5.15.15, 5.15.16, 5.15.17, 5.15.18, 5.15.19, 5.15.20, 5.15.21, 5.15.22, 5.15.23, 5.15.24, 5.15.25, 5.15.26, 5.15.27, 5.15.28, 5.15.29, 5.15.30, 5.15.31


External links
https://git.kernel.org/stable/c/06f0ff82c70241a766a811ae1acf07d6e2734dcb
https://git.kernel.org/stable/c/2c74374c2e88c7b7992bf808d9f9391f7452f9d9
https://git.kernel.org/stable/c/4c905f6740a365464e91467aa50916555b28213d
https://git.kernel.org/stable/c/4d28522acd1c4415c85f6b33463713a268f68965
https://git.kernel.org/stable/c/64f24c76dd0ce53d0fa3a0bfb9aeea507c769485
https://git.kernel.org/stable/c/88791b79a1eb2ba94e95d039243e28433583a67b
https://git.kernel.org/stable/c/a3cc32863b175168283cb0a5fde08de6a1e27df9
https://git.kernel.org/stable/c/dd03640529204ef4b8189fbdea08217d8d98271f
https://git.kernel.org/stable/c/fafb904156fbb8f1dd34970cd5223e00b47c33be
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.32


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability