CVE-2022-48742

Severity CVSS v4.0:
Pending analysis
Type:
CWE-416 Use After Free
Publication date:
20/06/2024
Last modified:
20/08/2024

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> rtnetlink: make sure to refresh master_dev/m_ops in __rtnl_newlink()<br /> <br /> While looking at one unrelated syzbot bug, I found the replay logic<br /> in __rtnl_newlink() to potentially trigger use-after-free.<br /> <br /> It is better to clear master_dev and m_ops inside the loop,<br /> in case we have to replay it.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 3.14 (including) 4.9.300 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.10 (including) 4.14.265 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.15 (including) 4.19.228 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.20 (including) 5.4.177 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.5 (including) 5.10.97 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.20 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 5.16.6 (excluding)