This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
Metrics
Affected Vendors & Products
References
History
Fri, 27 Sep 2024 14:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-415 |
Thu, 22 Aug 2024 19:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Title | kernel: xen/netfront: react properly to failing gnttab_end_foreign_access_ref() | |
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Thu, 22 Aug 2024 08:30:00 +0000
Thu, 22 Aug 2024 07:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: xen/netfront: react properly to failing gnttab_end_foreign_access_ref() When calling gnttab_end_foreign_access_ref() the returned value must be tested and the reaction to that value should be appropriate. In case of failure in xennet_get_responses() the reaction should not be to crash the system, but to disable the network device. The calls in setup_netfront() can be replaced by calls of gnttab_end_foreign_access(). While at it avoid double free of ring pages and grant references via xennet_disconnect_backend() in this case. This is CVE-2022-23042 / part of XSA-396. --- V2: - avoid double free V3: - remove pointless initializer (Jan Beulich) | This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. |
Title | xen/netfront: react properly to failing gnttab_end_foreign_access_ref() |
Thu, 22 Aug 2024 02:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: xen/netfront: react properly to failing gnttab_end_foreign_access_ref() When calling gnttab_end_foreign_access_ref() the returned value must be tested and the reaction to that value should be appropriate. In case of failure in xennet_get_responses() the reaction should not be to crash the system, but to disable the network device. The calls in setup_netfront() can be replaced by calls of gnttab_end_foreign_access(). While at it avoid double free of ring pages and grant references via xennet_disconnect_backend() in this case. This is CVE-2022-23042 / part of XSA-396. --- V2: - avoid double free V3: - remove pointless initializer (Jan Beulich) | |
Title | xen/netfront: react properly to failing gnttab_end_foreign_access_ref() | |
References |
|
|
MITRE
Status: REJECTED
Assigner: Linux
Published: 2024-08-22T01:30:07.023Z
Updated: 2024-08-22T07:31:41.517Z
Reserved: 2024-08-21T06:06:23.291Z
Link: CVE-2022-48900
Vulnrichment
No data.
NVD
Status : Rejected
Published: 2024-08-22T02:15:04.667
Modified: 2024-08-22T08:15:04.233
Link: CVE-2022-48900
Redhat