Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: rtnetlink: make sure to refresh master_dev/m_ops in __rtnl_newlink() While looking at one unrelated syzbot bug, I found the replay logic in __rtnl_newlink() to potentially trigger use-after-free. It is better to clear master_dev and m_ops inside the loop, in case we have to replay it.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 3.14, < 4.9.300 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/2cf180360d66bd657e606c1217e0e668e6faa303Mailing ListPatch
- https://git.kernel.org/stable/c/36a9a0aee881940476b254e0352581401b23f210Mailing ListPatch
- https://git.kernel.org/stable/c/3bbe2019dd12b8d13671ee6cda055d49637b4c39Mailing ListPatch
- https://git.kernel.org/stable/c/7d9211678c0f0624f74cdff36117ab8316697bb8Mailing ListPatch
- https://git.kernel.org/stable/c/a01e60a1ec6bef9be471fb7182a33c6d6f124e93Mailing ListPatch
- https://git.kernel.org/stable/c/bd43771ee9759dd9dfae946bff190e2c5a120de5Mailing ListPatch
- https://git.kernel.org/stable/c/c6f6f2444bdbe0079e41914a35081530d0409963Mailing ListPatch
- https://git.kernel.org/stable/c/def5e7070079b2a214b3b1a2fbec623e6fbfe34aMailing ListPatch
- https://git.kernel.org/stable/c/2cf180360d66bd657e606c1217e0e668e6faa303Mailing ListPatch
- https://git.kernel.org/stable/c/36a9a0aee881940476b254e0352581401b23f210Mailing ListPatch
- https://git.kernel.org/stable/c/3bbe2019dd12b8d13671ee6cda055d49637b4c39Mailing ListPatch
- https://git.kernel.org/stable/c/7d9211678c0f0624f74cdff36117ab8316697bb8Mailing ListPatch
- https://git.kernel.org/stable/c/a01e60a1ec6bef9be471fb7182a33c6d6f124e93Mailing ListPatch
- https://git.kernel.org/stable/c/bd43771ee9759dd9dfae946bff190e2c5a120de5Mailing ListPatch
- https://git.kernel.org/stable/c/c6f6f2444bdbe0079e41914a35081530d0409963Mailing ListPatch
FAQ
What is CVE-2022-48742?
CVE-2022-48742 is a vulnerability with a CVSS score of 7.8 (HIGH). In the Linux kernel, the following vulnerability has been resolved: rtnetlink: make sure to refresh master_dev/m_ops in __rtnl_newlink() While looking at one unrelated syzbot bug, I found the replay...
How severe is CVE-2022-48742?
CVE-2022-48742 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-48742?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.