CVE-2022-48949

In the Linux kernel, the following vulnerability has been resolved: igb: Initialize mailbox message for VF reset When a MAC address is not assigned to the VF, that portion of the message sent to the VF is not set. The memory, however, is allocated from the stack meaning that information may be leaked to the VM. Initialize the message buffer to 0 so that no information is passed to the VM in this case.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc8:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

29 Oct 2024, 16:32

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/a6629659af3f5c6a91e3914ea62554c975ab77f4 - () https://git.kernel.org/stable/c/a6629659af3f5c6a91e3914ea62554c975ab77f4 - Patch
References () https://git.kernel.org/stable/c/de5dc44370fbd6b46bd7f1a1e00369be54a041c8 - () https://git.kernel.org/stable/c/de5dc44370fbd6b46bd7f1a1e00369be54a041c8 - Patch
References () https://git.kernel.org/stable/c/51fd5ede7ed42f272682a0c33d6f0767b3484a3d - () https://git.kernel.org/stable/c/51fd5ede7ed42f272682a0c33d6f0767b3484a3d - Patch
References () https://git.kernel.org/stable/c/c581439a977545d61849a72e8ed631cfc8a2a3c1 - () https://git.kernel.org/stable/c/c581439a977545d61849a72e8ed631cfc8a2a3c1 - Patch
References () https://git.kernel.org/stable/c/367e1e3399dbc56fc669740c4ab60e35da632b0e - () https://git.kernel.org/stable/c/367e1e3399dbc56fc669740c4ab60e35da632b0e - Patch
References () https://git.kernel.org/stable/c/c383c7c35c7bc15e07a04eefa060a8a80cbeae29 - () https://git.kernel.org/stable/c/c383c7c35c7bc15e07a04eefa060a8a80cbeae29 - Patch
References () https://git.kernel.org/stable/c/f2479c3daaabccbac6c343a737615d0c595c6dc4 - () https://git.kernel.org/stable/c/f2479c3daaabccbac6c343a737615d0c595c6dc4 - Patch
References () https://git.kernel.org/stable/c/ef1d739dd1f362aec081278ff92f943c31eb177a - () https://git.kernel.org/stable/c/ef1d739dd1f362aec081278ff92f943c31eb177a - Patch
First Time Linux
Linux linux Kernel
CWE CWE-908
CPE cpe:2.3:o:linux:linux_kernel:6.1:rc8:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5

21 Oct 2024, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-21 20:15

Updated : 2024-10-29 16:32


NVD link : CVE-2022-48949

Mitre link : CVE-2022-48949


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-908

Use of Uninitialized Resource