CVE-2022-24448

An issue was discovered in fs/nfs/dir.c in the Linux kernel before 5.16.5. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should occur, but the server instead returns uninitialized data in the file descriptor.
References
Link Resource
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.5 Mailing List Patch Release Notes Vendor Advisory
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ac795161c93699d600db16c1a8cc23a65a1eceaf Mailing List Patch Vendor Advisory
https://github.com/torvalds/linux/commit/ab0fc21bc7105b54bafd85bd8b82742f9e68898a Patch Third Party Advisory
https://github.com/torvalds/linux/commit/ac795161c93699d600db16c1a8cc23a65a1eceaf Patch Third Party Advisory
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html Mailing List Third Party Advisory
https://lore.kernel.org/all/67d6a536-9027-1928-99b6-af512a36cd1a%40huawei.com/T/
https://www.debian.org/security/2022/dsa-5092 Third Party Advisory
https://www.debian.org/security/2022/dsa-5096 Third Party Advisory
https://www.spinics.net/lists/stable/msg531976.html Mailing List Patch Third Party Advisory
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.5 Mailing List Patch Release Notes Vendor Advisory
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ac795161c93699d600db16c1a8cc23a65a1eceaf Mailing List Patch Vendor Advisory
https://github.com/torvalds/linux/commit/ab0fc21bc7105b54bafd85bd8b82742f9e68898a Patch Third Party Advisory
https://github.com/torvalds/linux/commit/ac795161c93699d600db16c1a8cc23a65a1eceaf Patch Third Party Advisory
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html Mailing List Third Party Advisory
https://lore.kernel.org/all/67d6a536-9027-1928-99b6-af512a36cd1a%40huawei.com/T/
https://www.debian.org/security/2022/dsa-5092 Third Party Advisory
https://www.debian.org/security/2022/dsa-5096 Third Party Advisory
https://www.spinics.net/lists/stable/msg531976.html Mailing List Patch Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

21 Nov 2024, 06:50

Type Values Removed Values Added
References () https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.5 - Mailing List, Patch, Release Notes, Vendor Advisory () https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.5 - Mailing List, Patch, Release Notes, Vendor Advisory
References () https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ac795161c93699d600db16c1a8cc23a65a1eceaf - Mailing List, Patch, Vendor Advisory () https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ac795161c93699d600db16c1a8cc23a65a1eceaf - Mailing List, Patch, Vendor Advisory
References () https://github.com/torvalds/linux/commit/ab0fc21bc7105b54bafd85bd8b82742f9e68898a - Patch, Third Party Advisory () https://github.com/torvalds/linux/commit/ab0fc21bc7105b54bafd85bd8b82742f9e68898a - Patch, Third Party Advisory
References () https://github.com/torvalds/linux/commit/ac795161c93699d600db16c1a8cc23a65a1eceaf - Patch, Third Party Advisory () https://github.com/torvalds/linux/commit/ac795161c93699d600db16c1a8cc23a65a1eceaf - Patch, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html - Mailing List, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html - Mailing List, Third Party Advisory
References () https://lore.kernel.org/all/67d6a536-9027-1928-99b6-af512a36cd1a%40huawei.com/T/ - () https://lore.kernel.org/all/67d6a536-9027-1928-99b6-af512a36cd1a%40huawei.com/T/ -
References () https://www.debian.org/security/2022/dsa-5092 - Third Party Advisory () https://www.debian.org/security/2022/dsa-5092 - Third Party Advisory
References () https://www.debian.org/security/2022/dsa-5096 - Third Party Advisory () https://www.debian.org/security/2022/dsa-5096 - Third Party Advisory
References () https://www.spinics.net/lists/stable/msg531976.html - Mailing List, Patch, Third Party Advisory () https://www.spinics.net/lists/stable/msg531976.html - Mailing List, Patch, Third Party Advisory

07 Nov 2023, 03:44

Type Values Removed Values Added
References
  • {'url': 'https://lore.kernel.org/all/67d6a536-9027-1928-99b6-af512a36cd1a@huawei.com/T/', 'name': 'https://lore.kernel.org/all/67d6a536-9027-1928-99b6-af512a36cd1a@huawei.com/T/', 'tags': ['Issue Tracking', 'Mailing List', 'Vendor Advisory'], 'refsource': 'MISC'}
  • () https://lore.kernel.org/all/67d6a536-9027-1928-99b6-af512a36cd1a%40huawei.com/T/ -

08 Aug 2023, 14:22

Type Values Removed Values Added
CWE CWE-909 CWE-755
CWE-908

Information

Published : 2022-02-04 20:15

Updated : 2024-11-21 06:50


NVD link : CVE-2022-24448

Mitre link : CVE-2022-24448

CVE.ORG link : CVE-2022-24448


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-755

Improper Handling of Exceptional Conditions

CWE-908

Use of Uninitialized Resource