CVE-2022-48748

In the Linux kernel, the following vulnerability has been resolved: net: bridge: vlan: fix memory leak in __allowed_ingress When using per-vlan state, if vlan snooping and stats are disabled, untagged or priority-tagged ingress frame will go to check pvid state. If the port state is forwarding and the pvid state is not learning/forwarding, untagged or priority-tagged frame will be dropped but skb memory is not freed. Should free skb when __allowed_ingress returns false.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*

History

24 Mar 2025, 18:17

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux linux Kernel
Linux
References () https://git.kernel.org/stable/c/14be8d448fca6fe7b2a413831eedd55aef6c6511 - () https://git.kernel.org/stable/c/14be8d448fca6fe7b2a413831eedd55aef6c6511 - Patch
References () https://git.kernel.org/stable/c/446ff1fc37c74093e81db40811a07b5a19f1d797 - () https://git.kernel.org/stable/c/446ff1fc37c74093e81db40811a07b5a19f1d797 - Patch
References () https://git.kernel.org/stable/c/c5e216e880fa6f2cd9d4a6541269377657163098 - () https://git.kernel.org/stable/c/c5e216e880fa6f2cd9d4a6541269377657163098 - Patch
References () https://git.kernel.org/stable/c/fd20d9738395cf8e27d0a17eba34169699fccdff - () https://git.kernel.org/stable/c/fd20d9738395cf8e27d0a17eba34169699fccdff - Patch

21 Nov 2024, 07:33

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/14be8d448fca6fe7b2a413831eedd55aef6c6511 - () https://git.kernel.org/stable/c/14be8d448fca6fe7b2a413831eedd55aef6c6511 -
References () https://git.kernel.org/stable/c/446ff1fc37c74093e81db40811a07b5a19f1d797 - () https://git.kernel.org/stable/c/446ff1fc37c74093e81db40811a07b5a19f1d797 -
References () https://git.kernel.org/stable/c/c5e216e880fa6f2cd9d4a6541269377657163098 - () https://git.kernel.org/stable/c/c5e216e880fa6f2cd9d4a6541269377657163098 -
References () https://git.kernel.org/stable/c/fd20d9738395cf8e27d0a17eba34169699fccdff - () https://git.kernel.org/stable/c/fd20d9738395cf8e27d0a17eba34169699fccdff -

03 Jul 2024, 01:39

Type Values Removed Values Added
CWE CWE-400
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: net: bridge: vlan: corrige la pérdida de memoria en __allowed_ingress Cuando se usa el estado por VLAN, si la vigilancia de VLAN y las estadísticas están deshabilitadas, el marco de ingreso sin etiquetar o con etiqueta de prioridad irá a verificar pvid estado. Si el estado del puerto está reenviando y el estado del pvid no está aprendiendo/reenviando, se descartará la trama sin etiquetar o con etiqueta de prioridad, pero no se liberará la memoria skb. Debería liberar skb cuando __allowed_ingress devuelva falso.

20 Jun 2024, 12:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-20 12:15

Updated : 2025-03-24 18:17


NVD link : CVE-2022-48748

Mitre link : CVE-2022-48748

CVE.ORG link : CVE-2022-48748


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-400

Uncontrolled Resource Consumption