CVE-2022-49368

In the Linux kernel, the following vulnerability has been resolved: net: ethernet: mtk_eth_soc: out of bounds read in mtk_hwlro_get_fdir_entry() The "fsp->location" variable comes from user via ethtool_get_rxnfc(). Check that it is valid to prevent an out of bounds read.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

14 Apr 2025, 20:42

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux linux Kernel
Linux
CWE CWE-125
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.1
References () https://git.kernel.org/stable/c/0b238f75b65ed4462ef4cdfa718cac0ac7fce3b8 - () https://git.kernel.org/stable/c/0b238f75b65ed4462ef4cdfa718cac0ac7fce3b8 - Patch
References () https://git.kernel.org/stable/c/2bd1faedb74dc2a2be3972abcd4239b75a3e7b00 - () https://git.kernel.org/stable/c/2bd1faedb74dc2a2be3972abcd4239b75a3e7b00 - Patch
References () https://git.kernel.org/stable/c/4cde554c70d7397cfa2e4116bacb4accdfb6fd48 - () https://git.kernel.org/stable/c/4cde554c70d7397cfa2e4116bacb4accdfb6fd48 - Patch
References () https://git.kernel.org/stable/c/5ba81f82607ead85fe36f50869fc4f5661359ab8 - () https://git.kernel.org/stable/c/5ba81f82607ead85fe36f50869fc4f5661359ab8 - Patch
References () https://git.kernel.org/stable/c/657e7174603f0aab2cdedc64ac81edffd2a87afe - () https://git.kernel.org/stable/c/657e7174603f0aab2cdedc64ac81edffd2a87afe - Patch
References () https://git.kernel.org/stable/c/71ae30662ec610b92644d13f79c78f76f17873b3 - () https://git.kernel.org/stable/c/71ae30662ec610b92644d13f79c78f76f17873b3 - Patch
References () https://git.kernel.org/stable/c/b24ca1cf846273361d5bd73a35de95a486a54b6d - () https://git.kernel.org/stable/c/b24ca1cf846273361d5bd73a35de95a486a54b6d - Patch
References () https://git.kernel.org/stable/c/b4f0e57ea0d867aacffad7999527e48bd4ea9293 - () https://git.kernel.org/stable/c/b4f0e57ea0d867aacffad7999527e48bd4ea9293 - Patch
References () https://git.kernel.org/stable/c/e7e7104e2d5ddf3806a28695670f21bef471f1e1 - () https://git.kernel.org/stable/c/e7e7104e2d5ddf3806a28695670f21bef471f1e1 - Patch
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: ethernet: mtk_eth_soc: lectura fuera de los límites en mtk_hwlro_get_fdir_entry() La variable "fsp->location" proviene del usuario a través de ethtool_get_rxnfc(). Verifique que sea válida para evitar una lectura fuera de los límites.

26 Feb 2025, 07:01

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-26 07:01

Updated : 2025-04-14 20:42


NVD link : CVE-2022-49368

Mitre link : CVE-2022-49368

CVE.ORG link : CVE-2022-49368


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-125

Out-of-bounds Read