Executive Summary

Informations
Name CVE-2022-48742 First vendor Publication 2024-06-20
Vendor Cve Last vendor Modification 2024-08-20

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Overall CVSS Score 7.8
Base Score 7.8 Environmental Score 7.8
impact SubScore 5.9 Temporal Score 7.8
Exploitabality Sub Score 1.8
 
Attack Vector Local Attack Complexity Low
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact High
Integrity Impact High Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

rtnetlink: make sure to refresh master_dev/m_ops in __rtnl_newlink()

While looking at one unrelated syzbot bug, I found the replay logic in __rtnl_newlink() to potentially trigger use-after-free.

It is better to clear master_dev and m_ops inside the loop, in case we have to replay it.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48742

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-416 Use After Free

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 7
Os 3488

Sources (Detail)

https://git.kernel.org/stable/c/2cf180360d66bd657e606c1217e0e668e6faa303
https://git.kernel.org/stable/c/36a9a0aee881940476b254e0352581401b23f210
https://git.kernel.org/stable/c/3bbe2019dd12b8d13671ee6cda055d49637b4c39
https://git.kernel.org/stable/c/7d9211678c0f0624f74cdff36117ab8316697bb8
https://git.kernel.org/stable/c/a01e60a1ec6bef9be471fb7182a33c6d6f124e93
https://git.kernel.org/stable/c/bd43771ee9759dd9dfae946bff190e2c5a120de5
https://git.kernel.org/stable/c/c6f6f2444bdbe0079e41914a35081530d0409963
https://git.kernel.org/stable/c/def5e7070079b2a214b3b1a2fbec623e6fbfe34a
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
Date Informations
2024-11-21 21:23:11
  • Multiple Updates
2024-11-20 02:43:19
  • Multiple Updates
2024-11-14 02:43:12
  • Multiple Updates
2024-11-09 02:43:51
  • Multiple Updates
2024-10-26 02:41:37
  • Multiple Updates
2024-10-25 02:43:22
  • Multiple Updates
2024-10-23 02:42:46
  • Multiple Updates
2024-10-03 02:38:50
  • Multiple Updates
2024-10-02 02:37:13
  • Multiple Updates
2024-09-04 02:36:37
  • Multiple Updates
2024-08-22 00:28:03
  • Multiple Updates
2024-08-20 17:27:41
  • Multiple Updates
2024-06-20 17:27:36
  • First insertion