In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: do not allow SET_ID to refer to another table When doing lookups for sets on the same batch by using its ID, a set from a different table can be used. Then, when the table is removed, a reference to the set may be kept after the set is freed, leading to a potential use-after-free. When looking for sets by ID, use the table that was used for the lookup by name, and only return sets belonging to that same table. This fixes CVE-2022-2586, also reported as ZDI-CAN-17470.
https://git.kernel.org/stable/c/fab2f61cc3b0e441b1749f017cfee75f9bbaded7
https://git.kernel.org/stable/c/faafd9286f1355c76fe9ac3021c280297213330e
https://git.kernel.org/stable/c/f4fa03410f7c5f5bd8f90e9c11e9a8c4b526ff6f
https://git.kernel.org/stable/c/77d3b5038b7462318f5183e2ad704b01d57215a2
https://git.kernel.org/stable/c/470ee20e069a6d05ae549f7d0ef2bdbcee6a81b2
https://git.kernel.org/stable/c/1a4b18b1ff11ba26f9a852019d674fde9d1d1cff
https://git.kernel.org/stable/c/0d07039397527361850c554c192e749cfc879ea9