CVE-2022-49558
Linux Kernel vulnerability analysis and mitigation

Overview

CVE-2022-49558 affects the Linux kernel's netfilter subsystem, specifically the nftables component. The vulnerability involves a double hook unregistration issue in the netns path where _nftreleasehooks() is called from prenetns exit path which unregisters the hooks, and then the NETDEVUNREGISTER event is triggered which unregisters the hooks again (NVD).

Technical details

The issue occurs in the netfilter subsystem when _nftreleasehooks() is called from the prenetns exit path. The function unregisters the hooks, but subsequently, the NETDEV_UNREGISTER event is triggered, causing the hooks to be unregistered a second time. This leads to a warning message in the kernel log indicating a double unregistration attempt (Kernel Commit).

Impact

The vulnerability can trigger kernel warnings and potentially lead to system instability. When triggered, it produces warning messages in the kernel log indicating an attempt to unregister hooks that have already been unregistered (Kernel Commit).

Mitigation and workarounds

The issue has been fixed in the Linux kernel through a patch that modifies the hook unregistration process. The fix involves using kfreercu to release hooks in the cleannet path, ensuring that the NETDEV_UNREGISTER path sees unregistered hooks. This prevents the double unregistration issue (Kernel Commit).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management