CVE-2022-48639

In the Linux kernel, the following vulnerability has been resolved: net: sched: fix possible refcount leak in tc_new_tfilter() tfilter_put need to be called to put the refount got by tp->ops->get to avoid possible refcount leak when chain->tmplt_ops != NULL and chain->tmplt_ops != tp->ops.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.0:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.0:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.0:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.0:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.0:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.0:rc6:*:*:*:*:*:*

History

13 Jan 2025, 19:58

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:6.0:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.0:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.0:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.0:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.0:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.0:rc2:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE NVD-CWE-Other
First Time Linux linux Kernel
Linux
References () https://git.kernel.org/stable/c/0559d91ee3a2cd81b15ad5cd507539d6da867f88 - () https://git.kernel.org/stable/c/0559d91ee3a2cd81b15ad5cd507539d6da867f88 - Patch
References () https://git.kernel.org/stable/c/8844c750eeb03452e2b3319c27a526f447b82596 - () https://git.kernel.org/stable/c/8844c750eeb03452e2b3319c27a526f447b82596 - Patch
References () https://git.kernel.org/stable/c/903f7d322c17d8e306d766404b4604e81653902a - () https://git.kernel.org/stable/c/903f7d322c17d8e306d766404b4604e81653902a - Patch
References () https://git.kernel.org/stable/c/c2e1cfefcac35e0eea229e148c8284088ce437b5 - () https://git.kernel.org/stable/c/c2e1cfefcac35e0eea229e148c8284088ce437b5 - Patch
References () https://git.kernel.org/stable/c/f8162aed962be8fa07445b2b5928e84ab40dd8d7 - () https://git.kernel.org/stable/c/f8162aed962be8fa07445b2b5928e84ab40dd8d7 - Patch

21 Nov 2024, 07:33

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: sched: corrige posible fuga de recuento en tc_new_tfilter() Es necesario llamar a tfilter_put para colocar el recuento obtenido mediante tp->ops->get para evitar una posible fuga de recuento cuando se realiza la cadena. >tmplt_ops != NULL y cadena->tmplt_ops != tp->ops.
References () https://git.kernel.org/stable/c/0559d91ee3a2cd81b15ad5cd507539d6da867f88 - () https://git.kernel.org/stable/c/0559d91ee3a2cd81b15ad5cd507539d6da867f88 -
References () https://git.kernel.org/stable/c/8844c750eeb03452e2b3319c27a526f447b82596 - () https://git.kernel.org/stable/c/8844c750eeb03452e2b3319c27a526f447b82596 -
References () https://git.kernel.org/stable/c/903f7d322c17d8e306d766404b4604e81653902a - () https://git.kernel.org/stable/c/903f7d322c17d8e306d766404b4604e81653902a -
References () https://git.kernel.org/stable/c/c2e1cfefcac35e0eea229e148c8284088ce437b5 - () https://git.kernel.org/stable/c/c2e1cfefcac35e0eea229e148c8284088ce437b5 -
References () https://git.kernel.org/stable/c/f8162aed962be8fa07445b2b5928e84ab40dd8d7 - () https://git.kernel.org/stable/c/f8162aed962be8fa07445b2b5928e84ab40dd8d7 -

28 Apr 2024, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-28 13:15

Updated : 2025-01-13 19:58


NVD link : CVE-2022-48639

Mitre link : CVE-2022-48639

CVE.ORG link : CVE-2022-48639


JSON object : View

Products Affected

linux

  • linux_kernel