In the Linux kernel, the following vulnerability has been resolved: vdpa/mlx5: add validation for VIRTIO_NET_CTRL_MQ_VQ_PAIRS_SET command When control vq receives a VIRTIO_NET_CTRL_MQ_VQ_PAIRS_SET command request from the driver, presently there is no validation against the number of queue pairs to configure, or even if multiqueue had been negotiated or not is unverified. This may lead to kernel panic due to uninitialized resource for the queues were there any bogus request sent down by untrusted driver. Tie up the loose ends there.
History

Thu, 12 Sep 2024 08:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 11 Sep 2024 13:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 29 Aug 2024 22:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-455

cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published: 2024-07-16T12:25:27.144Z

Updated: 2024-09-11T17:34:07.092Z

Reserved: 2024-07-16T11:38:08.920Z

Link: CVE-2022-48864

cve-icon Vulnrichment

Updated: 2024-08-03T15:25:01.614Z

cve-icon NVD

Status : Analyzed

Published: 2024-07-16T13:15:13.233

Modified: 2024-07-23T14:44:00.093

Link: CVE-2022-48864

cve-icon Redhat

Severity : Moderate

Publid Date: 2024-07-16T00:00:00Z

Links: CVE-2022-48864 - Bugzilla