
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-48851 is a use-after-free vulnerability discovered in the Linux kernel's staging driver for gdm724x. The vulnerability was identified in the gdmlterx() function where the netifrxni() function frees the skb (socket buffer) before it is dereferenced to save the skb->len value. This vulnerability affects Linux kernel versions from 3.12 up to versions before 5.16.15 (NVD).
The vulnerability is classified as a Use After Free (CWE-416) issue in the Linux kernel's gdm724x LTE USB driver. The CVSS v3.1 base score is 7.8 (High), with the vector string CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H. The issue occurs specifically in the gdmlterx() function where there is an attempt to access the socket buffer's length after it has been freed by the netifrxni() function (NVD, Kernel Patch).
The vulnerability could potentially lead to system crashes, memory corruption, or privilege escalation due to the use-after-free condition in the kernel's networking subsystem. The high CVSS score indicates that successful exploitation could result in complete compromise of system confidentiality, integrity, and availability (NVD).
The vulnerability has been fixed in multiple Linux kernel versions through a patch that saves the skb->len value before calling netifrxni(). The fix has been backported to various stable kernel branches. Ubuntu has released fixes for affected versions including 20.04 LTS (5.4.0-117.132), 18.04 LTS (4.15.0-184.194), and 16.04 LTS (4.4.0-259.293) (Ubuntu).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."