CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
5.1%
In the Linux kernel, the following vulnerability has been resolved:
nvme-tcp: fix UAF when detecting digest errors We should also bail from the
io_work loop when we set rd_enabled to true, so we don’t attempt to read
data from the socket when the TCP stream is already out-of-sync or
corrupted.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 20.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws-5.15 | < any | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws-5.4 | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-azure | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-azure | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-azure-5.15 | < any | UNKNOWN |
ubuntu | 18.04 | noarch | linux-azure-5.4 | < any | UNKNOWN |
git.kernel.org/stable/c/13c80a6c112467bab5e44d090767930555fc17a5
git.kernel.org/stable/c/160f3549a907a50e51a8518678ba2dcf2541abea
git.kernel.org/stable/c/19816a0214684f70b49b25075ff8c402fdd611d3
git.kernel.org/stable/c/5914fa32ef1b7766fea933f9eed94ac5c00aa7ff
git.kernel.org/stable/c/c3eb461aa56e6fa94fb80442ba2586bd223a8886
launchpad.net/bugs/cve/CVE-2022-48686
nvd.nist.gov/vuln/detail/CVE-2022-48686
security-tracker.debian.org/tracker/CVE-2022-48686
www.cve.org/CVERecord?id=CVE-2022-48686