Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2022-48742
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-20 Jun, 2024 | 11:13
Updated At-04 May, 2025 | 08:22
Rejected At-
▼CVE Numbering Authority (CNA)
rtnetlink: make sure to refresh master_dev/m_ops in __rtnl_newlink()

In the Linux kernel, the following vulnerability has been resolved: rtnetlink: make sure to refresh master_dev/m_ops in __rtnl_newlink() While looking at one unrelated syzbot bug, I found the replay logic in __rtnl_newlink() to potentially trigger use-after-free. It is better to clear master_dev and m_ops inside the loop, in case we have to replay it.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • net/core/rtnetlink.c
Default Status
unaffected
Versions
Affected
  • From ba7d49b1f0f8e5f24294a880ed576964059af5ef before 2cf180360d66bd657e606c1217e0e668e6faa303 (git)
  • From ba7d49b1f0f8e5f24294a880ed576964059af5ef before 7d9211678c0f0624f74cdff36117ab8316697bb8 (git)
  • From ba7d49b1f0f8e5f24294a880ed576964059af5ef before a01e60a1ec6bef9be471fb7182a33c6d6f124e93 (git)
  • From ba7d49b1f0f8e5f24294a880ed576964059af5ef before bd43771ee9759dd9dfae946bff190e2c5a120de5 (git)
  • From ba7d49b1f0f8e5f24294a880ed576964059af5ef before 3bbe2019dd12b8d13671ee6cda055d49637b4c39 (git)
  • From ba7d49b1f0f8e5f24294a880ed576964059af5ef before def5e7070079b2a214b3b1a2fbec623e6fbfe34a (git)
  • From ba7d49b1f0f8e5f24294a880ed576964059af5ef before 36a9a0aee881940476b254e0352581401b23f210 (git)
  • From ba7d49b1f0f8e5f24294a880ed576964059af5ef before c6f6f2444bdbe0079e41914a35081530d0409963 (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • net/core/rtnetlink.c
Default Status
affected
Versions
Affected
  • 3.14
Unaffected
  • From 0 before 3.14 (semver)
  • From 4.9.300 through 4.9.* (semver)
  • From 4.14.265 through 4.14.* (semver)
  • From 4.19.228 through 4.19.* (semver)
  • From 5.4.177 through 5.4.* (semver)
  • From 5.10.97 through 5.10.* (semver)
  • From 5.15.20 through 5.15.* (semver)
  • From 5.16.6 through 5.16.* (semver)
  • From 5.17 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/2cf180360d66bd657e606c1217e0e668e6faa303
N/A
https://git.kernel.org/stable/c/7d9211678c0f0624f74cdff36117ab8316697bb8
N/A
https://git.kernel.org/stable/c/a01e60a1ec6bef9be471fb7182a33c6d6f124e93
N/A
https://git.kernel.org/stable/c/bd43771ee9759dd9dfae946bff190e2c5a120de5
N/A
https://git.kernel.org/stable/c/3bbe2019dd12b8d13671ee6cda055d49637b4c39
N/A
https://git.kernel.org/stable/c/def5e7070079b2a214b3b1a2fbec623e6fbfe34a
N/A
https://git.kernel.org/stable/c/36a9a0aee881940476b254e0352581401b23f210
N/A
https://git.kernel.org/stable/c/c6f6f2444bdbe0079e41914a35081530d0409963
N/A
Hyperlink: https://git.kernel.org/stable/c/2cf180360d66bd657e606c1217e0e668e6faa303
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/7d9211678c0f0624f74cdff36117ab8316697bb8
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/a01e60a1ec6bef9be471fb7182a33c6d6f124e93
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/bd43771ee9759dd9dfae946bff190e2c5a120de5
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/3bbe2019dd12b8d13671ee6cda055d49637b4c39
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/def5e7070079b2a214b3b1a2fbec623e6fbfe34a
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/36a9a0aee881940476b254e0352581401b23f210
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/c6f6f2444bdbe0079e41914a35081530d0409963
Resource: N/A
▼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/2cf180360d66bd657e606c1217e0e668e6faa303
x_transferred
https://git.kernel.org/stable/c/7d9211678c0f0624f74cdff36117ab8316697bb8
x_transferred
https://git.kernel.org/stable/c/a01e60a1ec6bef9be471fb7182a33c6d6f124e93
x_transferred
https://git.kernel.org/stable/c/bd43771ee9759dd9dfae946bff190e2c5a120de5
x_transferred
https://git.kernel.org/stable/c/3bbe2019dd12b8d13671ee6cda055d49637b4c39
x_transferred
https://git.kernel.org/stable/c/def5e7070079b2a214b3b1a2fbec623e6fbfe34a
x_transferred
https://git.kernel.org/stable/c/36a9a0aee881940476b254e0352581401b23f210
x_transferred
https://git.kernel.org/stable/c/c6f6f2444bdbe0079e41914a35081530d0409963
x_transferred
Hyperlink: https://git.kernel.org/stable/c/2cf180360d66bd657e606c1217e0e668e6faa303
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/7d9211678c0f0624f74cdff36117ab8316697bb8
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/a01e60a1ec6bef9be471fb7182a33c6d6f124e93
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/bd43771ee9759dd9dfae946bff190e2c5a120de5
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/3bbe2019dd12b8d13671ee6cda055d49637b4c39
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/def5e7070079b2a214b3b1a2fbec623e6fbfe34a
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/36a9a0aee881940476b254e0352581401b23f210
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/c6f6f2444bdbe0079e41914a35081530d0409963
Resource:
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Details not found