
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-48839 is a vulnerability in the Linux kernel's network packet handling system, specifically in the net/packet subsystem. The vulnerability was discovered by syzbot and disclosed on July 16, 2024. It affects the packetrecvmsg() function when an AFPACKET socket is using PACKETCOPYTHRESH and mmap operations, where tpacket_rcv() queues skbs with uninitialized data in skb->cb[], potentially leading to a slab-out-of-bounds access (Kernel Patch).
The vulnerability is classified as an out-of-bounds read (CWE-125) with a CVSS v3.1 base score of 5.5 (Medium), with the vector string CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H. The issue occurs when tpacket_rcv() queues skbs with garbage data in skb->cb[], which can trigger a too large memory copy operation. The vulnerability stems from a regression related to the commit that allowed for hardware addresses larger than 8 bytes (NVD Database).
The vulnerability can lead to a stack-out-of-bounds access in the packetrecvmsg() function, potentially causing system instability or denial of service. The issue affects local users who have access to create AFPACKET sockets and use specific socket operations (NVD Database).
A fix has been implemented that clears 12 bytes that might be copied to user space later in the affected code path. The fix involves adding proper memory initialization in the tpacketrcv() function and implementing size checks in packetrecvmsg(). The patch has been merged into the Linux kernel (Kernel Patch).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."