Executive Summary

Informations
Name CVE-2022-48641 First vendor Publication 2024-04-28
Vendor Cve Last vendor Modification 2025-01-07

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Overall CVSS Score 5.5
Base Score 5.5 Environmental Score 5.5
impact SubScore 3.6 Temporal Score 5.5
Exploitabality Sub Score 1.8
 
Attack Vector Local Attack Complexity Low
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact None
Integrity Impact None Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

netfilter: ebtables: fix memory leak when blob is malformed

The bug fix was incomplete, it "replaced" crash with a memory leak. The old code had an assignment to "ret" embedded into the conditional, restore this.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48641

CWE : Common Weakness Enumeration

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 8
Os 3545

Sources (Detail)

https://git.kernel.org/stable/c/11ebf32fde46572b0aaf3c2bdd97d923ef5a03ab
https://git.kernel.org/stable/c/1e98318af2f163eadaff815abcef38d27ca92c1e
https://git.kernel.org/stable/c/38cf372b17f0a5f35c1b716a100532d539f0eb33
https://git.kernel.org/stable/c/62ce44c4fff947eebdf10bb582267e686e6835c9
https://git.kernel.org/stable/c/754e8b74281dd54a324698803483f47cf3355ae1
https://git.kernel.org/stable/c/d5917b7af7cae0e2804f9d127a03268035098b7f
https://git.kernel.org/stable/c/ebd97dbe3c55d68346b9c5fb00634a7f5b10bbee

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11