### [CVE-2022-1016](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016) ![](https://img.shields.io/static/v1?label=Product&message=Kernel&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3D%20Affects%20v3.13-rc1%20and%20later%2C%20Fixed%20in%20v5.18-rc1%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-824%20-%20Access%20of%20Uninitialized%20Pointer.&color=brighgreen) ### Description A flaw was found in the Linux kernel in net/netfilter/nf_tables_core.c:nft_do_chain, which can cause a use-after-free. This issue needs to handle 'return' with proper preconditions, as it can lead to a kernel information leak problem caused by a local, unprivileged attacker. ### POC #### Reference - http://blog.dbouman.nl/2022/04/02/How-The-Tables-Have-Turned-CVE-2022-1015-1016/ #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/kdn111/linux-kernel-exploitation - https://github.com/khanhdn111/linux-kernel-exploitation - https://github.com/khanhdz-06/linux-kernel-exploitation - https://github.com/khanhdz191/linux-kernel-exploitation - https://github.com/khanhhdz/linux-kernel-exploitation - https://github.com/khanhhdz06/linux-kernel-exploitation - https://github.com/khanhnd123/linux-kernel-exploitation - https://github.com/knd06/linux-kernel-exploitation - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/ssr-111/linux-kernel-exploitation - https://github.com/wechicken456/Linux-kernel - https://github.com/wkhnh06/linux-kernel-exploitation - https://github.com/xairy/linux-kernel-exploitation - https://github.com/yaobinwen/robin_on_rails - https://github.com/zanezhub/CVE-2022-1015-1016