This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 27 Sep 2024 14:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-415

Thu, 22 Aug 2024 19:30:00 +0000

Type Values Removed Values Added
Title kernel: xen/netfront: react properly to failing gnttab_end_foreign_access_ref()
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

threat_severity

Moderate


Thu, 22 Aug 2024 08:30:00 +0000


Thu, 22 Aug 2024 07:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: xen/netfront: react properly to failing gnttab_end_foreign_access_ref() When calling gnttab_end_foreign_access_ref() the returned value must be tested and the reaction to that value should be appropriate. In case of failure in xennet_get_responses() the reaction should not be to crash the system, but to disable the network device. The calls in setup_netfront() can be replaced by calls of gnttab_end_foreign_access(). While at it avoid double free of ring pages and grant references via xennet_disconnect_backend() in this case. This is CVE-2022-23042 / part of XSA-396. --- V2: - avoid double free V3: - remove pointless initializer (Jan Beulich) This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
Title xen/netfront: react properly to failing gnttab_end_foreign_access_ref()

Thu, 22 Aug 2024 02:00:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: xen/netfront: react properly to failing gnttab_end_foreign_access_ref() When calling gnttab_end_foreign_access_ref() the returned value must be tested and the reaction to that value should be appropriate. In case of failure in xennet_get_responses() the reaction should not be to crash the system, but to disable the network device. The calls in setup_netfront() can be replaced by calls of gnttab_end_foreign_access(). While at it avoid double free of ring pages and grant references via xennet_disconnect_backend() in this case. This is CVE-2022-23042 / part of XSA-396. --- V2: - avoid double free V3: - remove pointless initializer (Jan Beulich)
Title xen/netfront: react properly to failing gnttab_end_foreign_access_ref()
References

cve-icon MITRE

Status: REJECTED

Assigner: Linux

Published:

Updated: 2024-08-22T07:31:41.517Z

Reserved: 2024-08-21T06:06:23.291Z

Link: CVE-2022-48900

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Rejected

Published: 2024-08-22T02:15:04.667

Modified: 2024-08-22T08:15:04.233

Link: CVE-2022-48900

cve-icon Redhat

Severity : Moderate

Publid Date: 2024-08-22T00:00:00Z

Links: CVE-2022-48900 - Bugzilla

cve-icon OpenCVE Enrichment

No data.