Executive Summary

Informations
Name CVE-2022-48809 First vendor Publication 2024-07-16
Vendor Cve Last vendor Modification 2024-11-21

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Overall CVSS Score 5.5
Base Score 5.5 Environmental Score 5.5
impact SubScore 3.6 Temporal Score 5.5
Exploitabality Sub Score 1.8
 
Attack Vector Local Attack Complexity Low
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact None
Integrity Impact None Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

net: fix a memleak when uncloning an skb dst and its metadata

When uncloning an skb dst and its associated metadata, a new dst+metadata is allocated and later replaces the old one in the skb. This is helpful to have a non-shared dst+metadata attached to a specific skb.

The issue is the uncloned dst+metadata is initialized with a refcount of 1, which is increased to 2 before attaching it to the skb. When tun_dst_unclone returns, the dst+metadata is only referenced from a single place (the skb) while its refcount is 2. Its refcount will never drop to 0 (when the skb is consumed), leading to a memory leak.

Fix this by removing the call to dst_hold in tun_dst_unclone, as the dst+metadata refcount is already 1.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48809

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-401 Failure to Release Memory Before Removing Last Reference ('Memory Leak')

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 7
Os 3503

Sources (Detail)

https://git.kernel.org/stable/c/00e6d6c3bc14dfe32824e2c515f0e0f2d6ecf2f1
https://git.kernel.org/stable/c/0be943916d781df2b652793bb2d3ae4f9624c10a
https://git.kernel.org/stable/c/4ac84498fbe84a00e7aef185e2bb3e40ce71eca4
https://git.kernel.org/stable/c/8b1087b998e273f07be13dcb5f3ca4c309c7f108
https://git.kernel.org/stable/c/9eeabdf17fa0ab75381045c867c370f4cc75a613
https://git.kernel.org/stable/c/a80817adc2a4c1ba26a7aa5f3ed886e4a18dff88
https://git.kernel.org/stable/c/c1ff27d100e2670b03cbfddb9117e5f9fc672540
https://git.kernel.org/stable/c/fdcb263fa5cda15b8cb24a641fa2718c47605314
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
Date Informations
2025-01-08 02:47:16
  • Multiple Updates
2025-01-07 02:46:54
  • Multiple Updates
2024-12-25 02:45:40
  • Multiple Updates
2024-12-12 02:48:32
  • Multiple Updates
2024-11-25 05:23:26
  • Multiple Updates
2024-11-21 21:22:32
  • Multiple Updates
2024-11-20 02:43:23
  • Multiple Updates
2024-11-14 02:43:16
  • Multiple Updates
2024-11-09 02:43:54
  • Multiple Updates
2024-10-26 02:41:40
  • Multiple Updates
2024-10-25 02:43:25
  • Multiple Updates
2024-10-23 02:42:50
  • Multiple Updates
2024-10-03 02:38:53
  • Multiple Updates
2024-10-02 02:37:17
  • Multiple Updates
2024-09-04 02:36:39
  • Multiple Updates
2024-08-22 02:35:01
  • Multiple Updates
2024-08-08 00:27:46
  • Multiple Updates
2024-07-16 17:27:24
  • First insertion