{"id":"CVE-2022-48654","summary":"netfilter: nfnetlink_osf: fix possible bogus match in nf_osf_find()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nfnetlink_osf: fix possible bogus match in nf_osf_find()\n\nnf_osf_find() incorrectly returns true on mismatch, this leads to\ncopying uninitialized memory area in nft_osf which can be used to leak\nstale kernel stack data to userspace.","modified":"2026-04-11T12:41:16.396247Z","published":"2024-04-28T13:00:56.564Z","related":["SUSE-SU-2024:1641-1","SUSE-SU-2024:1642-1","SUSE-SU-2024:1644-1","SUSE-SU-2024:1645-1","SUSE-SU-2024:1647-1","SUSE-SU-2024:1650-1","SUSE-SU-2024:1659-1","SUSE-SU-2024:1663-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/48xxx/CVE-2022-48654.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/559c36c5a8d730c49ef805a72b213d3bba155cc8"},{"type":"WEB","url":"https://git.kernel.org/stable/c/5d75fef3e61e797fab5c3fbba88caa74ab92ad47"},{"type":"WEB","url":"https://git.kernel.org/stable/c/633c81c0449663f57d4138326d036dc6cfad674e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/721ea8ac063d70c2078c4e762212705de6151764"},{"type":"WEB","url":"https://git.kernel.org/stable/c/816eab147e5c6f6621922b8515ad9010ceb1735e"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/48xxx/CVE-2022-48654.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-48654"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"22c7652cdaa8cd33ce78bacceb4e826a3f795873"},{"fixed":"721ea8ac063d70c2078c4e762212705de6151764"},{"fixed":"5d75fef3e61e797fab5c3fbba88caa74ab92ad47"},{"fixed":"816eab147e5c6f6621922b8515ad9010ceb1735e"},{"fixed":"633c81c0449663f57d4138326d036dc6cfad674e"},{"fixed":"559c36c5a8d730c49ef805a72b213d3bba155cc8"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48654.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"5.2.0"},{"fixed":"5.4.215"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.5.0"},{"fixed":"5.10.146"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.71"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"5.19.12"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48654.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"}]}