{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2022-49368","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2025-02-26T02:08:31.555Z","datePublished":"2025-02-26T02:11:12.193Z","dateUpdated":"2025-10-01T19:46:53.404Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2025-05-04T08:36:12.480Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet: ethernet: mtk_eth_soc: out of bounds read in mtk_hwlro_get_fdir_entry()\n\nThe \"fsp->location\" variable comes from user via ethtool_get_rxnfc().\nCheck that it is valid to prevent an out of bounds read."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/net/ethernet/mediatek/mtk_eth_soc.c"],"versions":[{"version":"7aab747e5563ecbc9f3cb64ddea13fe7b9fee2bd","lessThan":"b4f0e57ea0d867aacffad7999527e48bd4ea9293","status":"affected","versionType":"git"},{"version":"7aab747e5563ecbc9f3cb64ddea13fe7b9fee2bd","lessThan":"5ba81f82607ead85fe36f50869fc4f5661359ab8","status":"affected","versionType":"git"},{"version":"7aab747e5563ecbc9f3cb64ddea13fe7b9fee2bd","lessThan":"657e7174603f0aab2cdedc64ac81edffd2a87afe","status":"affected","versionType":"git"},{"version":"7aab747e5563ecbc9f3cb64ddea13fe7b9fee2bd","lessThan":"2bd1faedb74dc2a2be3972abcd4239b75a3e7b00","status":"affected","versionType":"git"},{"version":"7aab747e5563ecbc9f3cb64ddea13fe7b9fee2bd","lessThan":"71ae30662ec610b92644d13f79c78f76f17873b3","status":"affected","versionType":"git"},{"version":"7aab747e5563ecbc9f3cb64ddea13fe7b9fee2bd","lessThan":"b24ca1cf846273361d5bd73a35de95a486a54b6d","status":"affected","versionType":"git"},{"version":"7aab747e5563ecbc9f3cb64ddea13fe7b9fee2bd","lessThan":"4cde554c70d7397cfa2e4116bacb4accdfb6fd48","status":"affected","versionType":"git"},{"version":"7aab747e5563ecbc9f3cb64ddea13fe7b9fee2bd","lessThan":"0b238f75b65ed4462ef4cdfa718cac0ac7fce3b8","status":"affected","versionType":"git"},{"version":"7aab747e5563ecbc9f3cb64ddea13fe7b9fee2bd","lessThan":"e7e7104e2d5ddf3806a28695670f21bef471f1e1","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/net/ethernet/mediatek/mtk_eth_soc.c"],"versions":[{"version":"4.9","status":"affected"},{"version":"0","lessThan":"4.9","status":"unaffected","versionType":"semver"},{"version":"4.9.318","lessThanOrEqual":"4.9.*","status":"unaffected","versionType":"semver"},{"version":"4.14.283","lessThanOrEqual":"4.14.*","status":"unaffected","versionType":"semver"},{"version":"4.19.247","lessThanOrEqual":"4.19.*","status":"unaffected","versionType":"semver"},{"version":"5.4.198","lessThanOrEqual":"5.4.*","status":"unaffected","versionType":"semver"},{"version":"5.10.122","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.47","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"5.17.15","lessThanOrEqual":"5.17.*","status":"unaffected","versionType":"semver"},{"version":"5.18.4","lessThanOrEqual":"5.18.*","status":"unaffected","versionType":"semver"},{"version":"5.19","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.9","versionEndExcluding":"4.9.318"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.9","versionEndExcluding":"4.14.283"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.9","versionEndExcluding":"4.19.247"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.9","versionEndExcluding":"5.4.198"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.9","versionEndExcluding":"5.10.122"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.9","versionEndExcluding":"5.15.47"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.9","versionEndExcluding":"5.17.15"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.9","versionEndExcluding":"5.18.4"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.9","versionEndExcluding":"5.19"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/b4f0e57ea0d867aacffad7999527e48bd4ea9293"},{"url":"https://git.kernel.org/stable/c/5ba81f82607ead85fe36f50869fc4f5661359ab8"},{"url":"https://git.kernel.org/stable/c/657e7174603f0aab2cdedc64ac81edffd2a87afe"},{"url":"https://git.kernel.org/stable/c/2bd1faedb74dc2a2be3972abcd4239b75a3e7b00"},{"url":"https://git.kernel.org/stable/c/71ae30662ec610b92644d13f79c78f76f17873b3"},{"url":"https://git.kernel.org/stable/c/b24ca1cf846273361d5bd73a35de95a486a54b6d"},{"url":"https://git.kernel.org/stable/c/4cde554c70d7397cfa2e4116bacb4accdfb6fd48"},{"url":"https://git.kernel.org/stable/c/0b238f75b65ed4462ef4cdfa718cac0ac7fce3b8"},{"url":"https://git.kernel.org/stable/c/e7e7104e2d5ddf3806a28695670f21bef471f1e1"}],"title":"net: ethernet: mtk_eth_soc: out of bounds read in mtk_hwlro_get_fdir_entry()","x_generator":{"engine":"bippy-1.2.0"}},"adp":[{"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":7.1,"attackVector":"LOCAL","baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H","integrityImpact":"NONE","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"LOW","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"id":"CVE-2022-49368","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"version":"2.0.3","timestamp":"2025-10-01T19:42:28.090960Z"}}}],"problemTypes":[{"descriptions":[{"lang":"en","type":"CWE","cweId":"CWE-125","description":"CWE-125 Out-of-bounds Read"}]}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-10-01T19:46:53.404Z"}}]}}