← Volver a CVEs
CVE-2022-48686
HIGH7.8
Descripcion
In the Linux kernel, the following vulnerability has been resolved: nvme-tcp: fix UAF when detecting digest errors We should also bail from the io_work loop when we set rd_enabled to true, so we don't attempt to read data from the socket when the TCP stream is already out-of-sync or corrupted.
Detalles CVE
Puntuacion CVSS v3.17.8
SeveridadHIGH
Vector CVSSCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Vector de ataqueLOCAL
ComplejidadLOW
Privilegios requeridosLOW
Interaccion usuarioNONE
Publicado5/3/2024
Ultima modificacion11/21/2024
Fuentenvd
Avistamientos honeypot0
Productos afectados
linux:linux_kernel
Debilidades (CWE)
CWE-416CWE-416
Referencias
https://git.kernel.org/stable/c/13c80a6c112467bab5e44d090767930555fc17a5(416baaa9-dc9f-4396-8d5f-8c081fb06d67)
https://git.kernel.org/stable/c/160f3549a907a50e51a8518678ba2dcf2541abea(416baaa9-dc9f-4396-8d5f-8c081fb06d67)
https://git.kernel.org/stable/c/19816a0214684f70b49b25075ff8c402fdd611d3(416baaa9-dc9f-4396-8d5f-8c081fb06d67)
https://git.kernel.org/stable/c/5914fa32ef1b7766fea933f9eed94ac5c00aa7ff(416baaa9-dc9f-4396-8d5f-8c081fb06d67)
https://git.kernel.org/stable/c/c3eb461aa56e6fa94fb80442ba2586bd223a8886(416baaa9-dc9f-4396-8d5f-8c081fb06d67)
https://git.kernel.org/stable/c/13c80a6c112467bab5e44d090767930555fc17a5(af854a3a-2127-422b-91ae-364da2661108)
https://git.kernel.org/stable/c/160f3549a907a50e51a8518678ba2dcf2541abea(af854a3a-2127-422b-91ae-364da2661108)
https://git.kernel.org/stable/c/19816a0214684f70b49b25075ff8c402fdd611d3(af854a3a-2127-422b-91ae-364da2661108)
https://git.kernel.org/stable/c/5914fa32ef1b7766fea933f9eed94ac5c00aa7ff(af854a3a-2127-422b-91ae-364da2661108)
https://git.kernel.org/stable/c/c3eb461aa56e6fa94fb80442ba2586bd223a8886(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.