Executive Summary

Informations
Name CVE-2022-48654 First vendor Publication 2024-04-28
Vendor Cve Last vendor Modification 2024-05-23

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Overall CVSS Score 5.5
Base Score 5.5 Environmental Score 5.5
impact SubScore 3.6 Temporal Score 5.5
Exploitabality Sub Score 1.8
 
Attack Vector Local Attack Complexity Low
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact High
Integrity Impact None Availability Impact None
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

netfilter: nfnetlink_osf: fix possible bogus match in nf_osf_find()

nf_osf_find() incorrectly returns true on mismatch, this leads to copying uninitialized memory area in nft_osf which can be used to leak stale kernel stack data to userspace.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48654

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 8
Os 3487

Sources (Detail)

https://git.kernel.org/stable/c/559c36c5a8d730c49ef805a72b213d3bba155cc8
https://git.kernel.org/stable/c/5d75fef3e61e797fab5c3fbba88caa74ab92ad47
https://git.kernel.org/stable/c/633c81c0449663f57d4138326d036dc6cfad674e
https://git.kernel.org/stable/c/721ea8ac063d70c2078c4e762212705de6151764
https://git.kernel.org/stable/c/816eab147e5c6f6621922b8515ad9010ceb1735e
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
Date Informations
2024-05-24 00:28:34
  • Multiple Updates
2024-04-29 17:27:26
  • Multiple Updates
2024-04-28 17:27:28
  • First insertion