This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
Project Subscriptions
No data.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 27 Sep 2024 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-415 |
Thu, 22 Aug 2024 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | kernel: xen/netfront: react properly to failing gnttab_end_foreign_access_ref() | |
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Thu, 22 Aug 2024 08:30:00 +0000
Thu, 22 Aug 2024 07:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In the Linux kernel, the following vulnerability has been resolved: xen/netfront: react properly to failing gnttab_end_foreign_access_ref() When calling gnttab_end_foreign_access_ref() the returned value must be tested and the reaction to that value should be appropriate. In case of failure in xennet_get_responses() the reaction should not be to crash the system, but to disable the network device. The calls in setup_netfront() can be replaced by calls of gnttab_end_foreign_access(). While at it avoid double free of ring pages and grant references via xennet_disconnect_backend() in this case. This is CVE-2022-23042 / part of XSA-396. --- V2: - avoid double free V3: - remove pointless initializer (Jan Beulich) | This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. |
| Title | xen/netfront: react properly to failing gnttab_end_foreign_access_ref() |
Thu, 22 Aug 2024 02:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In the Linux kernel, the following vulnerability has been resolved: xen/netfront: react properly to failing gnttab_end_foreign_access_ref() When calling gnttab_end_foreign_access_ref() the returned value must be tested and the reaction to that value should be appropriate. In case of failure in xennet_get_responses() the reaction should not be to crash the system, but to disable the network device. The calls in setup_netfront() can be replaced by calls of gnttab_end_foreign_access(). While at it avoid double free of ring pages and grant references via xennet_disconnect_backend() in this case. This is CVE-2022-23042 / part of XSA-396. --- V2: - avoid double free V3: - remove pointless initializer (Jan Beulich) | |
| Title | xen/netfront: react properly to failing gnttab_end_foreign_access_ref() | |
| References |
|
|
Projects
Sign in to view the affected projects.
Status: REJECTED
Assigner: Linux
Published:
Updated: 2024-08-22T07:31:41.517Z
Reserved: 2024-08-21T06:06:23.291Z
Link: CVE-2022-48900
No data.
Status : Rejected
Published: 2024-08-22T02:15:04.667
Modified: 2024-08-22T08:15:04.233
Link: CVE-2022-48900
OpenCVE Enrichment
No data.
Weaknesses