CVE-2022-48742

Source
https://cve.org/CVERecord?id=CVE-2022-48742
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-48742.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-48742
Downstream
Related
Published
2024-06-20T11:13:26.653Z
Modified
2026-03-14T12:00:05.923198Z
Summary
rtnetlink: make sure to refresh master_dev/m_ops in __rtnl_newlink()
Details

In the Linux kernel, the following vulnerability has been resolved:

rtnetlink: make sure to refresh masterdev/mops in _rtnlnewlink()

While looking at one unrelated syzbot bug, I found the replay logic in _rtnlnewlink() to potentially trigger use-after-free.

It is better to clear masterdev and mops inside the loop, in case we have to replay it.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/48xxx/CVE-2022-48742.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
ba7d49b1f0f8e5f24294a880ed576964059af5ef
Fixed
2cf180360d66bd657e606c1217e0e668e6faa303
Fixed
7d9211678c0f0624f74cdff36117ab8316697bb8
Fixed
a01e60a1ec6bef9be471fb7182a33c6d6f124e93
Fixed
bd43771ee9759dd9dfae946bff190e2c5a120de5
Fixed
3bbe2019dd12b8d13671ee6cda055d49637b4c39
Fixed
def5e7070079b2a214b3b1a2fbec623e6fbfe34a
Fixed
36a9a0aee881940476b254e0352581401b23f210
Fixed
c6f6f2444bdbe0079e41914a35081530d0409963

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-48742.json"