• CVE-2022-48742

发布时间: 2024年6月29日

修改时间: 2024年11月30日

概要

In the Linux kernel, the following vulnerability has been resolved: rtnetlink: make sure to refresh master_dev/m_ops in __rtnl_newlink() While looking at one unrelated syzbot bug, I found the replay logic in __rtnl_newlink() to potentially trigger use-after-free. It is better to clear master_dev and m_ops inside the loop, in case we have to replay it.

CVSS v3 指标

NVD openEuler
Confidentiality High None
Attack Vector Local Local
CVSS评分 7.8 5.5
Attack Complexity Low High
Privileges Required Low High
Scope Unchanged Unchanged
Integrity High None
User Interaction None None
Availability High None

安全公告

公告名 概要 发布时间
KylinSec-SA-2024-2998 In the Linux kernel, the following vulnerability has been resolved: rtnetlink: make sure to refresh master_dev/m_ops in __rtnl_newlink() While looking at one unrelated syzbot bug, I found the replay logic in __rtnl_newlink() to potentially trigger use-after-free. It is better to clear master_dev and m_ops inside the loop, in case we have to replay it. 2024年6月29日

影响产品

产品 状态
KY3.4-5A kernel Unaffected
KY3.5.2 kernel Unaffected
V6 kernel Unaffected