CVE-2022-48641 (GCVE-0-2022-48641)

Vulnerability from cvelistv5 – Published: 2024-04-28 12:59 – Updated: 2025-05-04 08:20
VLAI?
Summary
In the Linux kernel, the following vulnerability has been resolved: netfilter: ebtables: fix memory leak when blob is malformed The bug fix was incomplete, it "replaced" crash with a memory leak. The old code had an assignment to "ret" embedded into the conditional, restore this.
Severity ?
No CVSS data available.
Assigner
Impacted products
Vendor Product Version
Linux Linux Affected: afd01382594d643e1adeb16826423b418cdf8b8b , < 754e8b74281dd54a324698803483f47cf3355ae1 (git)
Affected: 358765beb836f5fc2ed26b5df4140d5d3548ac11 , < 1e98318af2f163eadaff815abcef38d27ca92c1e (git)
Affected: 160c4eb47db03b96c0c425358e7595ebefe8094d , < 11ebf32fde46572b0aaf3c2bdd97d923ef5a03ab (git)
Affected: 624c30521233e110cf50ba01980a591e045036ae , < ebd97dbe3c55d68346b9c5fb00634a7f5b10bbee (git)
Affected: 1b2c5428f773d60c116c7b1e390432e0cfb63cd6 , < d5917b7af7cae0e2804f9d127a03268035098b7f (git)
Affected: e53cfa017bf4575d0b948a8f45313ef66d897136 , < 38cf372b17f0a5f35c1b716a100532d539f0eb33 (git)
Affected: 7997eff82828304b780dc0a39707e1946d6f1ebf , < 62ce44c4fff947eebdf10bb582267e686e6835c9 (git)
Create a notification for this product.
    Linux Linux Affected: 4.14.292 , < 4.14.295 (semver)
Affected: 4.19.257 , < 4.19.260 (semver)
Affected: 5.4.212 , < 5.4.215 (semver)
Affected: 5.10.140 , < 5.10.146 (semver)
Affected: 5.15.64 , < 5.15.71 (semver)
Affected: 5.19.6 , < 5.19.12 (semver)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T15:17:55.593Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/754e8b74281dd54a324698803483f47cf3355ae1"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/1e98318af2f163eadaff815abcef38d27ca92c1e"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/11ebf32fde46572b0aaf3c2bdd97d923ef5a03ab"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/ebd97dbe3c55d68346b9c5fb00634a7f5b10bbee"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/d5917b7af7cae0e2804f9d127a03268035098b7f"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/38cf372b17f0a5f35c1b716a100532d539f0eb33"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/62ce44c4fff947eebdf10bb582267e686e6835c9"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2022-48641",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-10T15:46:20.766456Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-11T17:32:47.581Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "net/bridge/netfilter/ebtables.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "754e8b74281dd54a324698803483f47cf3355ae1",
              "status": "affected",
              "version": "afd01382594d643e1adeb16826423b418cdf8b8b",
              "versionType": "git"
            },
            {
              "lessThan": "1e98318af2f163eadaff815abcef38d27ca92c1e",
              "status": "affected",
              "version": "358765beb836f5fc2ed26b5df4140d5d3548ac11",
              "versionType": "git"
            },
            {
              "lessThan": "11ebf32fde46572b0aaf3c2bdd97d923ef5a03ab",
              "status": "affected",
              "version": "160c4eb47db03b96c0c425358e7595ebefe8094d",
              "versionType": "git"
            },
            {
              "lessThan": "ebd97dbe3c55d68346b9c5fb00634a7f5b10bbee",
              "status": "affected",
              "version": "624c30521233e110cf50ba01980a591e045036ae",
              "versionType": "git"
            },
            {
              "lessThan": "d5917b7af7cae0e2804f9d127a03268035098b7f",
              "status": "affected",
              "version": "1b2c5428f773d60c116c7b1e390432e0cfb63cd6",
              "versionType": "git"
            },
            {
              "lessThan": "38cf372b17f0a5f35c1b716a100532d539f0eb33",
              "status": "affected",
              "version": "e53cfa017bf4575d0b948a8f45313ef66d897136",
              "versionType": "git"
            },
            {
              "lessThan": "62ce44c4fff947eebdf10bb582267e686e6835c9",
              "status": "affected",
              "version": "7997eff82828304b780dc0a39707e1946d6f1ebf",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "net/bridge/netfilter/ebtables.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "4.14.295",
              "status": "affected",
              "version": "4.14.292",
              "versionType": "semver"
            },
            {
              "lessThan": "4.19.260",
              "status": "affected",
              "version": "4.19.257",
              "versionType": "semver"
            },
            {
              "lessThan": "5.4.215",
              "status": "affected",
              "version": "5.4.212",
              "versionType": "semver"
            },
            {
              "lessThan": "5.10.146",
              "status": "affected",
              "version": "5.10.140",
              "versionType": "semver"
            },
            {
              "lessThan": "5.15.71",
              "status": "affected",
              "version": "5.15.64",
              "versionType": "semver"
            },
            {
              "lessThan": "5.19.12",
              "status": "affected",
              "version": "5.19.6",
              "versionType": "semver"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "4.14.295",
                  "versionStartIncluding": "4.14.292",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "4.19.260",
                  "versionStartIncluding": "4.19.257",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.4.215",
                  "versionStartIncluding": "5.4.212",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.10.146",
                  "versionStartIncluding": "5.10.140",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.15.71",
                  "versionStartIncluding": "5.15.64",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.19.12",
                  "versionStartIncluding": "5.19.6",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: ebtables: fix memory leak when blob is malformed\n\nThe bug fix was incomplete, it \"replaced\" crash with a memory leak.\nThe old code had an assignment to \"ret\" embedded into the conditional,\nrestore this."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-04T08:20:18.707Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/754e8b74281dd54a324698803483f47cf3355ae1"
        },
        {
          "url": "https://git.kernel.org/stable/c/1e98318af2f163eadaff815abcef38d27ca92c1e"
        },
        {
          "url": "https://git.kernel.org/stable/c/11ebf32fde46572b0aaf3c2bdd97d923ef5a03ab"
        },
        {
          "url": "https://git.kernel.org/stable/c/ebd97dbe3c55d68346b9c5fb00634a7f5b10bbee"
        },
        {
          "url": "https://git.kernel.org/stable/c/d5917b7af7cae0e2804f9d127a03268035098b7f"
        },
        {
          "url": "https://git.kernel.org/stable/c/38cf372b17f0a5f35c1b716a100532d539f0eb33"
        },
        {
          "url": "https://git.kernel.org/stable/c/62ce44c4fff947eebdf10bb582267e686e6835c9"
        }
      ],
      "title": "netfilter: ebtables: fix memory leak when blob is malformed",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2022-48641",
    "datePublished": "2024-04-28T12:59:53.047Z",
    "dateReserved": "2024-02-25T13:44:28.316Z",
    "dateUpdated": "2025-05-04T08:20:18.707Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.14.292\", \"versionEndExcluding\": \"4.14.295\", \"matchCriteriaId\": \"716DA97D-04B9-453C-974F-AE4E8DAA3F44\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.19.257\", \"versionEndExcluding\": \"4.19.260\", \"matchCriteriaId\": \"222EAB98-7DFB-4D56-B3E1-03D9D708D7C2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"5.4.212\", \"versionEndExcluding\": \"5.4.215\", \"matchCriteriaId\": \"D8822B45-EFD9-4E7D-B7C0-4B325D460411\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"5.10.140\", \"versionEndExcluding\": \"5.10.146\", \"matchCriteriaId\": \"46F3A060-702E-4018-94C5-4E7FC03AB0F5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"5.15.64\", \"versionEndExcluding\": \"5.15.71\", \"matchCriteriaId\": \"E9A066D2-5BB3-49A3-9666-5736C6889680\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"5.19.6\", \"versionEndExcluding\": \"5.19.12\", \"matchCriteriaId\": \"F7C38106-1200-4F0A-A144-7F7E34C1383D\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nnetfilter: ebtables: fix memory leak when blob is malformed\\n\\nThe bug fix was incomplete, it \\\"replaced\\\" crash with a memory leak.\\nThe old code had an assignment to \\\"ret\\\" embedded into the conditional,\\nrestore this.\"}, {\"lang\": \"es\", \"value\": \"En el kernel de Linux, se resolvi\\u00f3 la siguiente vulnerabilidad: netfilter: ebtables: corrige la p\\u00e9rdida de memoria cuando el blob tiene un formato incorrecto La correcci\\u00f3n del error estaba incompleta, \\\"reemplaz\\u00f3\\\" el bloqueo con una p\\u00e9rdida de memoria. El c\\u00f3digo antiguo ten\\u00eda una asignaci\\u00f3n para \\\"ret\\\" incrustada en el condicional, restaurar esto.\"}]",
      "id": "CVE-2022-48641",
      "lastModified": "2025-01-07T16:57:26.363",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 5.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 3.6}]}",
      "published": "2024-04-28T13:15:06.950",
      "references": "[{\"url\": \"https://git.kernel.org/stable/c/11ebf32fde46572b0aaf3c2bdd97d923ef5a03ab\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.kernel.org/stable/c/1e98318af2f163eadaff815abcef38d27ca92c1e\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.kernel.org/stable/c/38cf372b17f0a5f35c1b716a100532d539f0eb33\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.kernel.org/stable/c/62ce44c4fff947eebdf10bb582267e686e6835c9\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.kernel.org/stable/c/754e8b74281dd54a324698803483f47cf3355ae1\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.kernel.org/stable/c/d5917b7af7cae0e2804f9d127a03268035098b7f\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.kernel.org/stable/c/ebd97dbe3c55d68346b9c5fb00634a7f5b10bbee\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.kernel.org/stable/c/11ebf32fde46572b0aaf3c2bdd97d923ef5a03ab\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.kernel.org/stable/c/1e98318af2f163eadaff815abcef38d27ca92c1e\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.kernel.org/stable/c/38cf372b17f0a5f35c1b716a100532d539f0eb33\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.kernel.org/stable/c/62ce44c4fff947eebdf10bb582267e686e6835c9\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.kernel.org/stable/c/754e8b74281dd54a324698803483f47cf3355ae1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.kernel.org/stable/c/d5917b7af7cae0e2804f9d127a03268035098b7f\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.kernel.org/stable/c/ebd97dbe3c55d68346b9c5fb00634a7f5b10bbee\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}]",
      "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
      "vulnStatus": "Analyzed",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-401\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2022-48641\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-04-28T13:15:06.950\",\"lastModified\":\"2025-01-07T16:57:26.363\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nnetfilter: ebtables: fix memory leak when blob is malformed\\n\\nThe bug fix was incomplete, it \\\"replaced\\\" crash with a memory leak.\\nThe old code had an assignment to \\\"ret\\\" embedded into the conditional,\\nrestore this.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: netfilter: ebtables: corrige la p\u00e9rdida de memoria cuando el blob tiene un formato incorrecto La correcci\u00f3n del error estaba incompleta, \\\"reemplaz\u00f3\\\" el bloqueo con una p\u00e9rdida de memoria. El c\u00f3digo antiguo ten\u00eda una asignaci\u00f3n para \\\"ret\\\" incrustada en el condicional, restaurar esto.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-401\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.14.292\",\"versionEndExcluding\":\"4.14.295\",\"matchCriteriaId\":\"716DA97D-04B9-453C-974F-AE4E8DAA3F44\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.19.257\",\"versionEndExcluding\":\"4.19.260\",\"matchCriteriaId\":\"222EAB98-7DFB-4D56-B3E1-03D9D708D7C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.4.212\",\"versionEndExcluding\":\"5.4.215\",\"matchCriteriaId\":\"D8822B45-EFD9-4E7D-B7C0-4B325D460411\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.10.140\",\"versionEndExcluding\":\"5.10.146\",\"matchCriteriaId\":\"46F3A060-702E-4018-94C5-4E7FC03AB0F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.15.64\",\"versionEndExcluding\":\"5.15.71\",\"matchCriteriaId\":\"E9A066D2-5BB3-49A3-9666-5736C6889680\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.19.6\",\"versionEndExcluding\":\"5.19.12\",\"matchCriteriaId\":\"F7C38106-1200-4F0A-A144-7F7E34C1383D\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/11ebf32fde46572b0aaf3c2bdd97d923ef5a03ab\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/1e98318af2f163eadaff815abcef38d27ca92c1e\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/38cf372b17f0a5f35c1b716a100532d539f0eb33\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/62ce44c4fff947eebdf10bb582267e686e6835c9\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/754e8b74281dd54a324698803483f47cf3355ae1\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/d5917b7af7cae0e2804f9d127a03268035098b7f\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/ebd97dbe3c55d68346b9c5fb00634a7f5b10bbee\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/11ebf32fde46572b0aaf3c2bdd97d923ef5a03ab\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/1e98318af2f163eadaff815abcef38d27ca92c1e\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/38cf372b17f0a5f35c1b716a100532d539f0eb33\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/62ce44c4fff947eebdf10bb582267e686e6835c9\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/754e8b74281dd54a324698803483f47cf3355ae1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/d5917b7af7cae0e2804f9d127a03268035098b7f\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/ebd97dbe3c55d68346b9c5fb00634a7f5b10bbee\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://git.kernel.org/stable/c/754e8b74281dd54a324698803483f47cf3355ae1\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/1e98318af2f163eadaff815abcef38d27ca92c1e\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/11ebf32fde46572b0aaf3c2bdd97d923ef5a03ab\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/ebd97dbe3c55d68346b9c5fb00634a7f5b10bbee\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/d5917b7af7cae0e2804f9d127a03268035098b7f\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/38cf372b17f0a5f35c1b716a100532d539f0eb33\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/62ce44c4fff947eebdf10bb582267e686e6835c9\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-03T15:17:55.593Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2022-48641\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-09-10T15:46:20.766456Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-09-11T12:42:12.444Z\"}}], \"cna\": {\"title\": \"netfilter: ebtables: fix memory leak when blob is malformed\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"afd01382594d643e1adeb16826423b418cdf8b8b\", \"lessThan\": \"754e8b74281dd54a324698803483f47cf3355ae1\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"358765beb836f5fc2ed26b5df4140d5d3548ac11\", \"lessThan\": \"1e98318af2f163eadaff815abcef38d27ca92c1e\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"160c4eb47db03b96c0c425358e7595ebefe8094d\", \"lessThan\": \"11ebf32fde46572b0aaf3c2bdd97d923ef5a03ab\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"624c30521233e110cf50ba01980a591e045036ae\", \"lessThan\": \"ebd97dbe3c55d68346b9c5fb00634a7f5b10bbee\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"1b2c5428f773d60c116c7b1e390432e0cfb63cd6\", \"lessThan\": \"d5917b7af7cae0e2804f9d127a03268035098b7f\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"e53cfa017bf4575d0b948a8f45313ef66d897136\", \"lessThan\": \"38cf372b17f0a5f35c1b716a100532d539f0eb33\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"7997eff82828304b780dc0a39707e1946d6f1ebf\", \"lessThan\": \"62ce44c4fff947eebdf10bb582267e686e6835c9\", \"versionType\": \"git\"}], \"programFiles\": [\"net/bridge/netfilter/ebtables.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"4.14.292\", \"lessThan\": \"4.14.295\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"4.19.257\", \"lessThan\": \"4.19.260\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"5.4.212\", \"lessThan\": \"5.4.215\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"5.10.140\", \"lessThan\": \"5.10.146\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"5.15.64\", \"lessThan\": \"5.15.71\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"5.19.6\", \"lessThan\": \"5.19.12\", \"versionType\": \"semver\"}], \"programFiles\": [\"net/bridge/netfilter/ebtables.c\"], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/754e8b74281dd54a324698803483f47cf3355ae1\"}, {\"url\": \"https://git.kernel.org/stable/c/1e98318af2f163eadaff815abcef38d27ca92c1e\"}, {\"url\": \"https://git.kernel.org/stable/c/11ebf32fde46572b0aaf3c2bdd97d923ef5a03ab\"}, {\"url\": \"https://git.kernel.org/stable/c/ebd97dbe3c55d68346b9c5fb00634a7f5b10bbee\"}, {\"url\": \"https://git.kernel.org/stable/c/d5917b7af7cae0e2804f9d127a03268035098b7f\"}, {\"url\": \"https://git.kernel.org/stable/c/38cf372b17f0a5f35c1b716a100532d539f0eb33\"}, {\"url\": \"https://git.kernel.org/stable/c/62ce44c4fff947eebdf10bb582267e686e6835c9\"}], \"x_generator\": {\"engine\": \"bippy-1.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nnetfilter: ebtables: fix memory leak when blob is malformed\\n\\nThe bug fix was incomplete, it \\\"replaced\\\" crash with a memory leak.\\nThe old code had an assignment to \\\"ret\\\" embedded into the conditional,\\nrestore this.\"}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"4.14.295\", \"versionStartIncluding\": \"4.14.292\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"4.19.260\", \"versionStartIncluding\": \"4.19.257\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.4.215\", \"versionStartIncluding\": \"5.4.212\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.10.146\", \"versionStartIncluding\": \"5.10.140\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.15.71\", \"versionStartIncluding\": \"5.15.64\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.19.12\", \"versionStartIncluding\": \"5.19.6\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2025-05-04T08:20:18.707Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2022-48641\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-05-04T08:20:18.707Z\", \"dateReserved\": \"2024-02-25T13:44:28.316Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-04-28T12:59:53.047Z\", \"assignerShortName\": \"Linux\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…