CVE-2022-48686

In the Linux kernel, the following vulnerability has been resolved: nvme-tcp: fix UAF when detecting digest errors We should also bail from the io_work loop when we set rd_enabled to true, so we don't attempt to read data from the socket when the TCP stream is already out-of-sync or corrupted.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

21 Nov 2024, 22:15

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/13c80a6c112467bab5e44d090767930555fc17a5 - Patch () https://git.kernel.org/stable/c/13c80a6c112467bab5e44d090767930555fc17a5 - Patch
References () https://git.kernel.org/stable/c/160f3549a907a50e51a8518678ba2dcf2541abea - Patch () https://git.kernel.org/stable/c/160f3549a907a50e51a8518678ba2dcf2541abea - Patch
References () https://git.kernel.org/stable/c/19816a0214684f70b49b25075ff8c402fdd611d3 - Patch () https://git.kernel.org/stable/c/19816a0214684f70b49b25075ff8c402fdd611d3 - Patch
References () https://git.kernel.org/stable/c/5914fa32ef1b7766fea933f9eed94ac5c00aa7ff - Patch () https://git.kernel.org/stable/c/5914fa32ef1b7766fea933f9eed94ac5c00aa7ff - Patch
References () https://git.kernel.org/stable/c/c3eb461aa56e6fa94fb80442ba2586bd223a8886 - Patch () https://git.kernel.org/stable/c/c3eb461aa56e6fa94fb80442ba2586bd223a8886 - Patch

23 May 2024, 20:33

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE CWE-416
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: nvme-tcp: corrige UAF al detectar errores de resumen. También debemos salir del bucle io_work cuando configuramos rd_enabled en verdadero, para no intentar leer datos del socket cuando el flujo TCP ya no está sincronizado o está dañado.
First Time Linux linux Kernel
Linux
References () https://git.kernel.org/stable/c/13c80a6c112467bab5e44d090767930555fc17a5 - () https://git.kernel.org/stable/c/13c80a6c112467bab5e44d090767930555fc17a5 - Patch
References () https://git.kernel.org/stable/c/160f3549a907a50e51a8518678ba2dcf2541abea - () https://git.kernel.org/stable/c/160f3549a907a50e51a8518678ba2dcf2541abea - Patch
References () https://git.kernel.org/stable/c/19816a0214684f70b49b25075ff8c402fdd611d3 - () https://git.kernel.org/stable/c/19816a0214684f70b49b25075ff8c402fdd611d3 - Patch
References () https://git.kernel.org/stable/c/5914fa32ef1b7766fea933f9eed94ac5c00aa7ff - () https://git.kernel.org/stable/c/5914fa32ef1b7766fea933f9eed94ac5c00aa7ff - Patch
References () https://git.kernel.org/stable/c/c3eb461aa56e6fa94fb80442ba2586bd223a8886 - () https://git.kernel.org/stable/c/c3eb461aa56e6fa94fb80442ba2586bd223a8886 - Patch

03 May 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-03 15:15

Updated : 2024-11-21 22:15


NVD link : CVE-2022-48686

Mitre link : CVE-2022-48686

CVE.ORG link : CVE-2022-48686


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free