CVE-2022-50780 — Expired Pointer Dereference in Linux
Severity
5.5MEDIUM
No vectorEPSS
0.0%
top 89.30%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 24
Description
In the Linux kernel, the following vulnerability has been resolved:
net: fix UAF issue in nfqnl_nf_hook_drop() when ops_init() failed
When the ops_init() interface is invoked to initialize the net, but
ops->init() fails, data is released. However, the ptr pointer in
net->gen is invalid. In this case, when nfqnl_nf_hook_drop() is invoked
to release the net, invalid address access occurs.
The process is as follows:
setup_net()
ops_init()
data = kzalloc(...) ---> alloc "data"
net_assign_generic(…
Affected Packages4 packages
▶CVEListV5linux/linuxf875bae065334907796da12523f9df85c89f5712 — 5a2ea549be94924364f6911227d99be86e8cf34a+6
🔴Vulnerability Details
3OSV▶
CVE-2022-50780: In the Linux kernel, the following vulnerability has been resolved: net: fix UAF issue in nfqnl_nf_hook_drop() when ops_init() failed When the ops_ini↗2025-12-24
GHSA▶
GHSA-mpc6-67r3-hw66: In the Linux kernel, the following vulnerability has been resolved:
net: fix UAF issue in nfqnl_nf_hook_drop() when ops_init() failed
When the ops_i↗2025-12-24