Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 27 Sep 2024 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-415 |
Thu, 22 Aug 2024 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | kernel: xen/netfront: react properly to failing gnttab_end_foreign_access_ref() | |
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Thu, 22 Aug 2024 08:30:00 +0000
Thu, 22 Aug 2024 07:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In the Linux kernel, the following vulnerability has been resolved: xen/netfront: react properly to failing gnttab_end_foreign_access_ref() When calling gnttab_end_foreign_access_ref() the returned value must be tested and the reaction to that value should be appropriate. In case of failure in xennet_get_responses() the reaction should not be to crash the system, but to disable the network device. The calls in setup_netfront() can be replaced by calls of gnttab_end_foreign_access(). While at it avoid double free of ring pages and grant references via xennet_disconnect_backend() in this case. This is CVE-2022-23042 / part of XSA-396. --- V2: - avoid double free V3: - remove pointless initializer (Jan Beulich) | This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. |
| Title | xen/netfront: react properly to failing gnttab_end_foreign_access_ref() |
Thu, 22 Aug 2024 02:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In the Linux kernel, the following vulnerability has been resolved: xen/netfront: react properly to failing gnttab_end_foreign_access_ref() When calling gnttab_end_foreign_access_ref() the returned value must be tested and the reaction to that value should be appropriate. In case of failure in xennet_get_responses() the reaction should not be to crash the system, but to disable the network device. The calls in setup_netfront() can be replaced by calls of gnttab_end_foreign_access(). While at it avoid double free of ring pages and grant references via xennet_disconnect_backend() in this case. This is CVE-2022-23042 / part of XSA-396. --- V2: - avoid double free V3: - remove pointless initializer (Jan Beulich) | |
| Title | xen/netfront: react properly to failing gnttab_end_foreign_access_ref() | |
| References |
|
|
Subscriptions
No data.
Status: REJECTED
Assigner: Linux
Published:
Updated: 2024-08-22T07:31:41.517Z
Reserved: 2024-08-21T06:06:23.291Z
Link: CVE-2022-48900
No data.
Status : Rejected
Published: 2024-08-22T02:15:04.667
Modified: 2024-08-22T08:15:04.233
Link: CVE-2022-48900
OpenCVE Enrichment
No data.