Skip to main content

CVE-2022-48642: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2022-48642cvecve-2022-48642
Published: Sun Apr 28 2024 (04/28/2024, 12:59:57 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: fix percpu memory leak at nf_tables_addchain() It seems to me that percpu memory for chain stats started leaking since commit 3bc158f8d0330f0a ("netfilter: nf_tables: map basechain priority to hardware priority") when nft_chain_offload_priority() returned an error.

AI-Powered Analysis

AILast updated: 06/30/2025, 18:10:08 UTC

Technical Analysis

CVE-2022-48642 is a vulnerability identified in the Linux kernel's netfilter subsystem, specifically within the nftables implementation. The issue pertains to a per-CPU memory leak occurring in the function nf_tables_addchain(). This leak was introduced following the commit 3bc158f8d0330f0a, which modified how nft_chain_offload_priority() maps basechain priority to hardware priority. When nft_chain_offload_priority() returns an error, the per-CPU memory allocated for chain statistics is not properly released, causing a memory leak. Over time, this can lead to increased memory consumption on affected systems, potentially degrading system performance or causing resource exhaustion. The vulnerability does not appear to allow direct code execution or privilege escalation but impacts system stability and availability through resource depletion. The flaw affects Linux kernel versions that include the referenced commit and is resolved by fixing the memory leak in the nf_tables_addchain() function. There are no known exploits in the wild at this time, and no CVSS score has been assigned. The vulnerability is technical and specific to Linux kernel networking internals, particularly impacting systems that utilize nftables for packet filtering and firewalling.

Potential Impact

For European organizations, the primary impact of CVE-2022-48642 lies in potential degradation of network infrastructure stability and availability. Organizations relying on Linux-based firewalls, routers, or servers using nftables for network filtering may experience gradual memory exhaustion, leading to system slowdowns or crashes if the leak is not addressed. This can disrupt critical network services, impacting business operations, especially in sectors with high network traffic such as telecommunications, finance, and cloud service providers. While the vulnerability does not directly compromise confidentiality or integrity, the availability impact can indirectly affect service reliability and uptime commitments. In environments with high network throughput or long uptimes without frequent reboots, the risk of resource exhaustion is higher. European organizations with stringent uptime and security requirements should prioritize patching to maintain operational continuity and avoid potential denial-of-service conditions caused by memory leaks.

Mitigation Recommendations

To mitigate CVE-2022-48642, European organizations should: 1) Apply the latest Linux kernel updates that include the fix for the nf_tables_addchain() memory leak as soon as they become available from their Linux distribution vendors. 2) Monitor system memory usage on network devices and servers running nftables to detect abnormal increases in per-CPU memory consumption that could indicate the leak is active. 3) Implement proactive system restarts or service reloads as a temporary measure to reclaim leaked memory if patching cannot be immediately applied. 4) Review and audit nftables configurations to ensure they are optimized and not unnecessarily complex, reducing the chance of triggering the bug. 5) Employ resource monitoring and alerting tools tailored to detect memory leaks and unusual resource usage patterns in network filtering components. 6) Coordinate with Linux distribution security advisories and maintain an updated inventory of affected systems to prioritize remediation efforts effectively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-02-25T13:44:28.316Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982ec4522896dcbe5d80

Added to database: 5/21/2025, 9:09:02 AM

Last enriched: 6/30/2025, 6:10:08 PM

Last updated: 8/17/2025, 12:55:20 AM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats