CVE-2022-48851

In the Linux kernel, the following vulnerability has been resolved: staging: gdm724x: fix use after free in gdm_lte_rx() The netif_rx_ni() function frees the skb so we can't dereference it to save the skb->len.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

23 Jul 2024, 17:03

Type Values Removed Values Added
CWE CWE-416
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: staging: gdm724x: corrige el use after free en gdm_lte_rx() La función netif_rx_ni() libera el skb para que no podamos desreferenciarlo para guardar el skb->len.
First Time Linux
Linux linux Kernel
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/1fb9dd3787495b4deb0efe66c58306b65691a48f - () https://git.kernel.org/stable/c/1fb9dd3787495b4deb0efe66c58306b65691a48f - Patch
References () https://git.kernel.org/stable/c/403e3afe241b62401de1f8629c9c6b9b3d69dbff - () https://git.kernel.org/stable/c/403e3afe241b62401de1f8629c9c6b9b3d69dbff - Patch
References () https://git.kernel.org/stable/c/48ecdf3e29a6e514e8196691589c7dfc6c4ac169 - () https://git.kernel.org/stable/c/48ecdf3e29a6e514e8196691589c7dfc6c4ac169 - Patch
References () https://git.kernel.org/stable/c/6d9700b445098dbbce0caff4b8cfca214cf1e757 - () https://git.kernel.org/stable/c/6d9700b445098dbbce0caff4b8cfca214cf1e757 - Patch
References () https://git.kernel.org/stable/c/6dc7b87c62423bfa68139fe95e85028aab584c9a - () https://git.kernel.org/stable/c/6dc7b87c62423bfa68139fe95e85028aab584c9a - Patch
References () https://git.kernel.org/stable/c/83a9c886c2b5a0d28c0b37e1736b47f38d61332a - () https://git.kernel.org/stable/c/83a9c886c2b5a0d28c0b37e1736b47f38d61332a - Patch
References () https://git.kernel.org/stable/c/d39dc79513e99147b4c158a8a9e46743e23944f5 - () https://git.kernel.org/stable/c/d39dc79513e99147b4c158a8a9e46743e23944f5 - Patch
References () https://git.kernel.org/stable/c/fc7f750dc9d102c1ed7bbe4591f991e770c99033 - () https://git.kernel.org/stable/c/fc7f750dc9d102c1ed7bbe4591f991e770c99033 - Patch

16 Jul 2024, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-16 13:15

Updated : 2024-07-23 17:03


NVD link : CVE-2022-48851

Mitre link : CVE-2022-48851

CVE.ORG link : CVE-2022-48851


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free