cve-2022-48641
Vulnerability from cvelistv5
Published
2024-04-28 12:59
Modified
2024-12-19 08:04
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: netfilter: ebtables: fix memory leak when blob is malformed The bug fix was incomplete, it "replaced" crash with a memory leak. The old code had an assignment to "ret" embedded into the conditional, restore this.
References
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/11ebf32fde46572b0aaf3c2bdd97d923ef5a03abPatch
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/1e98318af2f163eadaff815abcef38d27ca92c1ePatch
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/38cf372b17f0a5f35c1b716a100532d539f0eb33Patch
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/62ce44c4fff947eebdf10bb582267e686e6835c9Patch
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/754e8b74281dd54a324698803483f47cf3355ae1Patch
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/d5917b7af7cae0e2804f9d127a03268035098b7fPatch
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/ebd97dbe3c55d68346b9c5fb00634a7f5b10bbeePatch
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/11ebf32fde46572b0aaf3c2bdd97d923ef5a03abPatch
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/1e98318af2f163eadaff815abcef38d27ca92c1ePatch
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/38cf372b17f0a5f35c1b716a100532d539f0eb33Patch
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/62ce44c4fff947eebdf10bb582267e686e6835c9Patch
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/754e8b74281dd54a324698803483f47cf3355ae1Patch
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/d5917b7af7cae0e2804f9d127a03268035098b7fPatch
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/ebd97dbe3c55d68346b9c5fb00634a7f5b10bbeePatch
Impacted products
Vendor Product Version
Linux Linux Version: afd01382594d643e1adeb16826423b418cdf8b8b
Version: 358765beb836f5fc2ed26b5df4140d5d3548ac11
Version: 160c4eb47db03b96c0c425358e7595ebefe8094d
Version: 624c30521233e110cf50ba01980a591e045036ae
Version: 1b2c5428f773d60c116c7b1e390432e0cfb63cd6
Version: e53cfa017bf4575d0b948a8f45313ef66d897136
Version: 7997eff82828304b780dc0a39707e1946d6f1ebf
Create a notification for this product.
   Linux Linux Version: 4.14.292   
Version: 4.19.257   
Version: 5.4.212   
Version: 5.10.140   
Version: 5.15.64   
Version: 5.19.6   
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T15:17:55.593Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/754e8b74281dd54a324698803483f47cf3355ae1"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/1e98318af2f163eadaff815abcef38d27ca92c1e"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/11ebf32fde46572b0aaf3c2bdd97d923ef5a03ab"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/ebd97dbe3c55d68346b9c5fb00634a7f5b10bbee"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/d5917b7af7cae0e2804f9d127a03268035098b7f"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/38cf372b17f0a5f35c1b716a100532d539f0eb33"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/62ce44c4fff947eebdf10bb582267e686e6835c9"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2022-48641",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-10T15:46:20.766456Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-11T17:32:47.581Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "net/bridge/netfilter/ebtables.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "754e8b74281dd54a324698803483f47cf3355ae1",
              "status": "affected",
              "version": "afd01382594d643e1adeb16826423b418cdf8b8b",
              "versionType": "git"
            },
            {
              "lessThan": "1e98318af2f163eadaff815abcef38d27ca92c1e",
              "status": "affected",
              "version": "358765beb836f5fc2ed26b5df4140d5d3548ac11",
              "versionType": "git"
            },
            {
              "lessThan": "11ebf32fde46572b0aaf3c2bdd97d923ef5a03ab",
              "status": "affected",
              "version": "160c4eb47db03b96c0c425358e7595ebefe8094d",
              "versionType": "git"
            },
            {
              "lessThan": "ebd97dbe3c55d68346b9c5fb00634a7f5b10bbee",
              "status": "affected",
              "version": "624c30521233e110cf50ba01980a591e045036ae",
              "versionType": "git"
            },
            {
              "lessThan": "d5917b7af7cae0e2804f9d127a03268035098b7f",
              "status": "affected",
              "version": "1b2c5428f773d60c116c7b1e390432e0cfb63cd6",
              "versionType": "git"
            },
            {
              "lessThan": "38cf372b17f0a5f35c1b716a100532d539f0eb33",
              "status": "affected",
              "version": "e53cfa017bf4575d0b948a8f45313ef66d897136",
              "versionType": "git"
            },
            {
              "lessThan": "62ce44c4fff947eebdf10bb582267e686e6835c9",
              "status": "affected",
              "version": "7997eff82828304b780dc0a39707e1946d6f1ebf",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "net/bridge/netfilter/ebtables.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "4.14.295",
              "status": "affected",
              "version": "4.14.292",
              "versionType": "semver"
            },
            {
              "lessThan": "4.19.260",
              "status": "affected",
              "version": "4.19.257",
              "versionType": "semver"
            },
            {
              "lessThan": "5.4.215",
              "status": "affected",
              "version": "5.4.212",
              "versionType": "semver"
            },
            {
              "lessThan": "5.10.146",
              "status": "affected",
              "version": "5.10.140",
              "versionType": "semver"
            },
            {
              "lessThan": "5.15.71",
              "status": "affected",
              "version": "5.15.64",
              "versionType": "semver"
            },
            {
              "lessThan": "5.19.12",
              "status": "affected",
              "version": "5.19.6",
              "versionType": "semver"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: ebtables: fix memory leak when blob is malformed\n\nThe bug fix was incomplete, it \"replaced\" crash with a memory leak.\nThe old code had an assignment to \"ret\" embedded into the conditional,\nrestore this."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-12-19T08:04:52.490Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/754e8b74281dd54a324698803483f47cf3355ae1"
        },
        {
          "url": "https://git.kernel.org/stable/c/1e98318af2f163eadaff815abcef38d27ca92c1e"
        },
        {
          "url": "https://git.kernel.org/stable/c/11ebf32fde46572b0aaf3c2bdd97d923ef5a03ab"
        },
        {
          "url": "https://git.kernel.org/stable/c/ebd97dbe3c55d68346b9c5fb00634a7f5b10bbee"
        },
        {
          "url": "https://git.kernel.org/stable/c/d5917b7af7cae0e2804f9d127a03268035098b7f"
        },
        {
          "url": "https://git.kernel.org/stable/c/38cf372b17f0a5f35c1b716a100532d539f0eb33"
        },
        {
          "url": "https://git.kernel.org/stable/c/62ce44c4fff947eebdf10bb582267e686e6835c9"
        }
      ],
      "title": "netfilter: ebtables: fix memory leak when blob is malformed",
      "x_generator": {
        "engine": "bippy-5f407fcff5a0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2022-48641",
    "datePublished": "2024-04-28T12:59:53.047Z",
    "dateReserved": "2024-02-25T13:44:28.316Z",
    "dateUpdated": "2024-12-19T08:04:52.490Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2022-48641\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-04-28T13:15:06.950\",\"lastModified\":\"2025-01-07T16:57:26.363\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nnetfilter: ebtables: fix memory leak when blob is malformed\\n\\nThe bug fix was incomplete, it \\\"replaced\\\" crash with a memory leak.\\nThe old code had an assignment to \\\"ret\\\" embedded into the conditional,\\nrestore this.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: netfilter: ebtables: corrige la p\u00e9rdida de memoria cuando el blob tiene un formato incorrecto La correcci\u00f3n del error estaba incompleta, \\\"reemplaz\u00f3\\\" el bloqueo con una p\u00e9rdida de memoria. El c\u00f3digo antiguo ten\u00eda una asignaci\u00f3n para \\\"ret\\\" incrustada en el condicional, restaurar esto.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-401\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.14.292\",\"versionEndExcluding\":\"4.14.295\",\"matchCriteriaId\":\"716DA97D-04B9-453C-974F-AE4E8DAA3F44\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.19.257\",\"versionEndExcluding\":\"4.19.260\",\"matchCriteriaId\":\"222EAB98-7DFB-4D56-B3E1-03D9D708D7C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.4.212\",\"versionEndExcluding\":\"5.4.215\",\"matchCriteriaId\":\"D8822B45-EFD9-4E7D-B7C0-4B325D460411\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.10.140\",\"versionEndExcluding\":\"5.10.146\",\"matchCriteriaId\":\"46F3A060-702E-4018-94C5-4E7FC03AB0F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.15.64\",\"versionEndExcluding\":\"5.15.71\",\"matchCriteriaId\":\"E9A066D2-5BB3-49A3-9666-5736C6889680\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.19.6\",\"versionEndExcluding\":\"5.19.12\",\"matchCriteriaId\":\"F7C38106-1200-4F0A-A144-7F7E34C1383D\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/11ebf32fde46572b0aaf3c2bdd97d923ef5a03ab\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/1e98318af2f163eadaff815abcef38d27ca92c1e\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/38cf372b17f0a5f35c1b716a100532d539f0eb33\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/62ce44c4fff947eebdf10bb582267e686e6835c9\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/754e8b74281dd54a324698803483f47cf3355ae1\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/d5917b7af7cae0e2804f9d127a03268035098b7f\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/ebd97dbe3c55d68346b9c5fb00634a7f5b10bbee\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/11ebf32fde46572b0aaf3c2bdd97d923ef5a03ab\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/1e98318af2f163eadaff815abcef38d27ca92c1e\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/38cf372b17f0a5f35c1b716a100532d539f0eb33\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/62ce44c4fff947eebdf10bb582267e686e6835c9\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/754e8b74281dd54a324698803483f47cf3355ae1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/d5917b7af7cae0e2804f9d127a03268035098b7f\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/ebd97dbe3c55d68346b9c5fb00634a7f5b10bbee\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://git.kernel.org/stable/c/754e8b74281dd54a324698803483f47cf3355ae1\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/1e98318af2f163eadaff815abcef38d27ca92c1e\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/11ebf32fde46572b0aaf3c2bdd97d923ef5a03ab\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/ebd97dbe3c55d68346b9c5fb00634a7f5b10bbee\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/d5917b7af7cae0e2804f9d127a03268035098b7f\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/38cf372b17f0a5f35c1b716a100532d539f0eb33\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/62ce44c4fff947eebdf10bb582267e686e6835c9\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-03T15:17:55.593Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2022-48641\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-09-10T15:46:20.766456Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-09-11T12:42:12.444Z\"}}], \"cna\": {\"title\": \"netfilter: ebtables: fix memory leak when blob is malformed\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"afd01382594d643e1adeb16826423b418cdf8b8b\", \"lessThan\": \"754e8b74281dd54a324698803483f47cf3355ae1\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"358765beb836f5fc2ed26b5df4140d5d3548ac11\", \"lessThan\": \"1e98318af2f163eadaff815abcef38d27ca92c1e\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"160c4eb47db03b96c0c425358e7595ebefe8094d\", \"lessThan\": \"11ebf32fde46572b0aaf3c2bdd97d923ef5a03ab\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"624c30521233e110cf50ba01980a591e045036ae\", \"lessThan\": \"ebd97dbe3c55d68346b9c5fb00634a7f5b10bbee\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"1b2c5428f773d60c116c7b1e390432e0cfb63cd6\", \"lessThan\": \"d5917b7af7cae0e2804f9d127a03268035098b7f\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"e53cfa017bf4575d0b948a8f45313ef66d897136\", \"lessThan\": \"38cf372b17f0a5f35c1b716a100532d539f0eb33\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"7997eff82828304b780dc0a39707e1946d6f1ebf\", \"lessThan\": \"62ce44c4fff947eebdf10bb582267e686e6835c9\", \"versionType\": \"git\"}], \"programFiles\": [\"net/bridge/netfilter/ebtables.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"4.14.292\", \"lessThan\": \"4.14.295\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"4.19.257\", \"lessThan\": \"4.19.260\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"5.4.212\", \"lessThan\": \"5.4.215\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"5.10.140\", \"lessThan\": \"5.10.146\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"5.15.64\", \"lessThan\": \"5.15.71\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"5.19.6\", \"lessThan\": \"5.19.12\", \"versionType\": \"semver\"}], \"programFiles\": [\"net/bridge/netfilter/ebtables.c\"], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/754e8b74281dd54a324698803483f47cf3355ae1\"}, {\"url\": \"https://git.kernel.org/stable/c/1e98318af2f163eadaff815abcef38d27ca92c1e\"}, {\"url\": \"https://git.kernel.org/stable/c/11ebf32fde46572b0aaf3c2bdd97d923ef5a03ab\"}, {\"url\": \"https://git.kernel.org/stable/c/ebd97dbe3c55d68346b9c5fb00634a7f5b10bbee\"}, {\"url\": \"https://git.kernel.org/stable/c/d5917b7af7cae0e2804f9d127a03268035098b7f\"}, {\"url\": \"https://git.kernel.org/stable/c/38cf372b17f0a5f35c1b716a100532d539f0eb33\"}, {\"url\": \"https://git.kernel.org/stable/c/62ce44c4fff947eebdf10bb582267e686e6835c9\"}], \"x_generator\": {\"engine\": \"bippy-5f407fcff5a0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nnetfilter: ebtables: fix memory leak when blob is malformed\\n\\nThe bug fix was incomplete, it \\\"replaced\\\" crash with a memory leak.\\nThe old code had an assignment to \\\"ret\\\" embedded into the conditional,\\nrestore this.\"}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2024-12-19T08:04:52.490Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2022-48641\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-12-19T08:04:52.490Z\", \"dateReserved\": \"2024-02-25T13:44:28.316Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-04-28T12:59:53.047Z\", \"assignerShortName\": \"Linux\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.