Skip to main content

CVE-2022-48748: Vulnerability in Linux Linux

High
VulnerabilityCVE-2022-48748cvecve-2022-48748
Published: Thu Jun 20 2024 (06/20/2024, 11:13:30 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: net: bridge: vlan: fix memory leak in __allowed_ingress When using per-vlan state, if vlan snooping and stats are disabled, untagged or priority-tagged ingress frame will go to check pvid state. If the port state is forwarding and the pvid state is not learning/forwarding, untagged or priority-tagged frame will be dropped but skb memory is not freed. Should free skb when __allowed_ingress returns false.

AI-Powered Analysis

AILast updated: 07/03/2025, 03:12:45 UTC

Technical Analysis

CVE-2022-48748 is a high-severity vulnerability in the Linux kernel's network bridge VLAN handling code, specifically within the __allowed_ingress function. The issue arises when per-VLAN state is used with VLAN snooping and statistics disabled. In this scenario, untagged or priority-tagged ingress frames are checked against the port VLAN ID (PVID) state. If the port is in a forwarding state but the PVID state is neither learning nor forwarding, these frames are dropped as expected. However, the kernel fails to free the associated socket buffer (skb) memory when __allowed_ingress returns false, resulting in a memory leak. This vulnerability is categorized under CWE-400 (Uncontrolled Resource Consumption), indicating that the leak could lead to resource exhaustion. The vulnerability does not affect confidentiality or integrity directly but impacts availability by potentially causing denial of service (DoS) through memory exhaustion on affected systems. The CVSS v3.1 score is 7.5 (high), reflecting network attack vector, low attack complexity, no privileges required, no user interaction, and impact limited to availability. No known exploits are currently reported in the wild, but the vulnerability's nature makes it a concern for systems running Linux kernels with bridging and VLAN features enabled, especially in network infrastructure roles.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to network infrastructure devices and servers running Linux with bridging and VLAN configurations, such as virtualized environments, cloud platforms, and enterprise routers or switches using Linux-based systems. Exploitation could lead to memory leaks that degrade system performance or cause crashes, resulting in denial of service. This could disrupt critical business operations, especially in sectors relying on high availability networks like finance, telecommunications, healthcare, and government services. The impact is heightened in environments with heavy VLAN usage and where VLAN snooping and statistics are disabled, potentially common in customized or legacy network setups. Given the widespread use of Linux in European data centers and network equipment, the vulnerability could affect a broad range of organizations if unpatched. However, the lack of confidentiality or integrity impact means data breaches are unlikely directly from this flaw, but operational disruptions could have cascading effects on service delivery and compliance with regulations such as GDPR if availability is compromised.

Mitigation Recommendations

Organizations should promptly apply the Linux kernel patches that address CVE-2022-48748 once available. Until patches are deployed, administrators should audit network bridge configurations to identify if per-VLAN state is used alongside disabled VLAN snooping and statistics, and consider enabling VLAN snooping and statistics if feasible to mitigate the triggering condition. Monitoring system memory usage on network devices and servers with bridging enabled can help detect abnormal resource consumption indicative of exploitation attempts. Employing network segmentation and limiting exposure of vulnerable Linux bridge devices to untrusted networks reduces attack surface. Additionally, implementing automated patch management processes for Linux kernels in critical infrastructure will minimize exposure time. For virtualized environments, ensure hypervisor and guest OS bridging configurations are reviewed and hardened. Finally, maintain up-to-date intrusion detection systems that can alert on unusual network traffic patterns or resource usage spikes related to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-06-20T11:09:39.055Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d982ec4522896dcbe6055

Added to database: 5/21/2025, 9:09:02 AM

Last enriched: 7/3/2025, 3:12:45 AM

Last updated: 8/13/2025, 3:03:57 PM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats