Vulnerability Details : CVE-2022-48779
In the Linux kernel, the following vulnerability has been resolved:
net: mscc: ocelot: fix use-after-free in ocelot_vlan_del()
ocelot_vlan_member_del() will free the struct ocelot_bridge_vlan, so if
this is the same as the port's pvid_vlan which we access afterwards,
what we're accessing is freed memory.
Fix the bug by determining whether to clear ocelot_port->pvid_vlan prior
to calling ocelot_vlan_member_del().
Vulnerability category: Memory Corruption
Products affected by CVE-2022-48779
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-48779
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 13 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-48779
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST | 2024-08-21 |
CWE ids for CVE-2022-48779
-
The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory "belongs" to the code that operates on the new pointer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2022-48779
-
https://git.kernel.org/stable/c/c98bed60cdd7f22237ae256cc9c1c3087206b8a2
net: mscc: ocelot: fix use-after-free in ocelot_vlan_del() - kernel/git/stable/linux.git - Linux kernel stable treeMailing List;Patch
-
https://git.kernel.org/stable/c/ef57640575406f57f5b3393cf57f457b0ace837e
net: mscc: ocelot: fix use-after-free in ocelot_vlan_del() - kernel/git/stable/linux.git - Linux kernel stable treeMailing List;Patch
Jump to