CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
Low
In the Linux kernel, the following vulnerability has been resolved: nvme-tcp: fix UAF when detecting digest errors We should also bail from the io_work loop when we set rd_enabled to true, so we don’t attempt to read data from the socket when the TCP stream is already out-of-sync or corrupted.
git.kernel.org/stable/c/13c80a6c112467bab5e44d090767930555fc17a5
git.kernel.org/stable/c/160f3549a907a50e51a8518678ba2dcf2541abea
git.kernel.org/stable/c/19816a0214684f70b49b25075ff8c402fdd611d3
git.kernel.org/stable/c/5914fa32ef1b7766fea933f9eed94ac5c00aa7ff
git.kernel.org/stable/c/c3eb461aa56e6fa94fb80442ba2586bd223a8886
ubuntu.com/security/CVE-2022-48686
www.cve.org/CVERecord?id=CVE-2022-48686