CVE-2022-48748: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: net: bridge: vlan: fix memory leak in __allowed_ingress When using per-vlan state, if vlan snooping and stats are disabled, untagged or priority-tagged ingress frame will go to check pvid state. If the port state is forwarding and the pvid state is not learning/forwarding, untagged or priority-tagged frame will be dropped but skb memory is not freed. Should free skb when __allowed_ingress returns false.
AI Analysis
Technical Summary
CVE-2022-48748 is a high-severity vulnerability in the Linux kernel's network bridge VLAN handling code, specifically within the __allowed_ingress function. The issue arises when per-VLAN state is used with VLAN snooping and statistics disabled. In this scenario, untagged or priority-tagged ingress frames are checked against the port VLAN ID (PVID) state. If the port is in a forwarding state but the PVID state is neither learning nor forwarding, these frames are dropped as expected. However, the kernel fails to free the associated socket buffer (skb) memory when __allowed_ingress returns false, resulting in a memory leak. This vulnerability is categorized under CWE-400 (Uncontrolled Resource Consumption), indicating that the leak could lead to resource exhaustion. The vulnerability does not affect confidentiality or integrity directly but impacts availability by potentially causing denial of service (DoS) through memory exhaustion on affected systems. The CVSS v3.1 score is 7.5 (high), reflecting network attack vector, low attack complexity, no privileges required, no user interaction, and impact limited to availability. No known exploits are currently reported in the wild, but the vulnerability's nature makes it a concern for systems running Linux kernels with bridging and VLAN features enabled, especially in network infrastructure roles.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to network infrastructure devices and servers running Linux with bridging and VLAN configurations, such as virtualized environments, cloud platforms, and enterprise routers or switches using Linux-based systems. Exploitation could lead to memory leaks that degrade system performance or cause crashes, resulting in denial of service. This could disrupt critical business operations, especially in sectors relying on high availability networks like finance, telecommunications, healthcare, and government services. The impact is heightened in environments with heavy VLAN usage and where VLAN snooping and statistics are disabled, potentially common in customized or legacy network setups. Given the widespread use of Linux in European data centers and network equipment, the vulnerability could affect a broad range of organizations if unpatched. However, the lack of confidentiality or integrity impact means data breaches are unlikely directly from this flaw, but operational disruptions could have cascading effects on service delivery and compliance with regulations such as GDPR if availability is compromised.
Mitigation Recommendations
Organizations should promptly apply the Linux kernel patches that address CVE-2022-48748 once available. Until patches are deployed, administrators should audit network bridge configurations to identify if per-VLAN state is used alongside disabled VLAN snooping and statistics, and consider enabling VLAN snooping and statistics if feasible to mitigate the triggering condition. Monitoring system memory usage on network devices and servers with bridging enabled can help detect abnormal resource consumption indicative of exploitation attempts. Employing network segmentation and limiting exposure of vulnerable Linux bridge devices to untrusted networks reduces attack surface. Additionally, implementing automated patch management processes for Linux kernels in critical infrastructure will minimize exposure time. For virtualized environments, ensure hypervisor and guest OS bridging configurations are reviewed and hardened. Finally, maintain up-to-date intrusion detection systems that can alert on unusual network traffic patterns or resource usage spikes related to this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain, Poland
CVE-2022-48748: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: net: bridge: vlan: fix memory leak in __allowed_ingress When using per-vlan state, if vlan snooping and stats are disabled, untagged or priority-tagged ingress frame will go to check pvid state. If the port state is forwarding and the pvid state is not learning/forwarding, untagged or priority-tagged frame will be dropped but skb memory is not freed. Should free skb when __allowed_ingress returns false.
AI-Powered Analysis
Technical Analysis
CVE-2022-48748 is a high-severity vulnerability in the Linux kernel's network bridge VLAN handling code, specifically within the __allowed_ingress function. The issue arises when per-VLAN state is used with VLAN snooping and statistics disabled. In this scenario, untagged or priority-tagged ingress frames are checked against the port VLAN ID (PVID) state. If the port is in a forwarding state but the PVID state is neither learning nor forwarding, these frames are dropped as expected. However, the kernel fails to free the associated socket buffer (skb) memory when __allowed_ingress returns false, resulting in a memory leak. This vulnerability is categorized under CWE-400 (Uncontrolled Resource Consumption), indicating that the leak could lead to resource exhaustion. The vulnerability does not affect confidentiality or integrity directly but impacts availability by potentially causing denial of service (DoS) through memory exhaustion on affected systems. The CVSS v3.1 score is 7.5 (high), reflecting network attack vector, low attack complexity, no privileges required, no user interaction, and impact limited to availability. No known exploits are currently reported in the wild, but the vulnerability's nature makes it a concern for systems running Linux kernels with bridging and VLAN features enabled, especially in network infrastructure roles.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to network infrastructure devices and servers running Linux with bridging and VLAN configurations, such as virtualized environments, cloud platforms, and enterprise routers or switches using Linux-based systems. Exploitation could lead to memory leaks that degrade system performance or cause crashes, resulting in denial of service. This could disrupt critical business operations, especially in sectors relying on high availability networks like finance, telecommunications, healthcare, and government services. The impact is heightened in environments with heavy VLAN usage and where VLAN snooping and statistics are disabled, potentially common in customized or legacy network setups. Given the widespread use of Linux in European data centers and network equipment, the vulnerability could affect a broad range of organizations if unpatched. However, the lack of confidentiality or integrity impact means data breaches are unlikely directly from this flaw, but operational disruptions could have cascading effects on service delivery and compliance with regulations such as GDPR if availability is compromised.
Mitigation Recommendations
Organizations should promptly apply the Linux kernel patches that address CVE-2022-48748 once available. Until patches are deployed, administrators should audit network bridge configurations to identify if per-VLAN state is used alongside disabled VLAN snooping and statistics, and consider enabling VLAN snooping and statistics if feasible to mitigate the triggering condition. Monitoring system memory usage on network devices and servers with bridging enabled can help detect abnormal resource consumption indicative of exploitation attempts. Employing network segmentation and limiting exposure of vulnerable Linux bridge devices to untrusted networks reduces attack surface. Additionally, implementing automated patch management processes for Linux kernels in critical infrastructure will minimize exposure time. For virtualized environments, ensure hypervisor and guest OS bridging configurations are reviewed and hardened. Finally, maintain up-to-date intrusion detection systems that can alert on unusual network traffic patterns or resource usage spikes related to this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-06-20T11:09:39.055Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d982ec4522896dcbe6055
Added to database: 5/21/2025, 9:09:02 AM
Last enriched: 7/3/2025, 3:12:45 AM
Last updated: 8/13/2025, 3:03:57 PM
Views: 15
Related Threats
CVE-2025-8989: SQL Injection in SourceCodester COVID 19 Testing Management System
MediumCVE-2025-8988: SQL Injection in SourceCodester COVID 19 Testing Management System
MediumCVE-2025-8987: SQL Injection in SourceCodester COVID 19 Testing Management System
MediumCVE-2025-8986: SQL Injection in SourceCodester COVID 19 Testing Management System
MediumCVE-2025-31987: CWE-405 Asymmetric Resource Consumption in HCL Software Connections Docs
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.