← Zuruck zu CVEs
CVE-2022-48686
HIGH7.8
Beschreibung
In the Linux kernel, the following vulnerability has been resolved: nvme-tcp: fix UAF when detecting digest errors We should also bail from the io_work loop when we set rd_enabled to true, so we don't attempt to read data from the socket when the TCP stream is already out-of-sync or corrupted.
CVE Details
CVSS v3.1 Bewertung7.8
SchweregradHIGH
CVSS VektorCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AngriffsvektorLOCAL
KomplexitatLOW
Erforderliche PrivilegienLOW
BenutzerinteraktionNONE
Veroffentlicht5/3/2024
Zuletzt geandert11/21/2024
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
linux:linux_kernel
Schwachen (CWE)
CWE-416CWE-416
Referenzen
https://git.kernel.org/stable/c/13c80a6c112467bab5e44d090767930555fc17a5(416baaa9-dc9f-4396-8d5f-8c081fb06d67)
https://git.kernel.org/stable/c/160f3549a907a50e51a8518678ba2dcf2541abea(416baaa9-dc9f-4396-8d5f-8c081fb06d67)
https://git.kernel.org/stable/c/19816a0214684f70b49b25075ff8c402fdd611d3(416baaa9-dc9f-4396-8d5f-8c081fb06d67)
https://git.kernel.org/stable/c/5914fa32ef1b7766fea933f9eed94ac5c00aa7ff(416baaa9-dc9f-4396-8d5f-8c081fb06d67)
https://git.kernel.org/stable/c/c3eb461aa56e6fa94fb80442ba2586bd223a8886(416baaa9-dc9f-4396-8d5f-8c081fb06d67)
https://git.kernel.org/stable/c/13c80a6c112467bab5e44d090767930555fc17a5(af854a3a-2127-422b-91ae-364da2661108)
https://git.kernel.org/stable/c/160f3549a907a50e51a8518678ba2dcf2541abea(af854a3a-2127-422b-91ae-364da2661108)
https://git.kernel.org/stable/c/19816a0214684f70b49b25075ff8c402fdd611d3(af854a3a-2127-422b-91ae-364da2661108)
https://git.kernel.org/stable/c/5914fa32ef1b7766fea933f9eed94ac5c00aa7ff(af854a3a-2127-422b-91ae-364da2661108)
https://git.kernel.org/stable/c/c3eb461aa56e6fa94fb80442ba2586bd223a8886(af854a3a-2127-422b-91ae-364da2661108)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.