跳转到帖子

Ubuntu: (CVE-2022-48949): linux vulnerability

recommended_posts

发布于
  • Members

Ubuntu: (CVE-2022-48949): linux vulnerability

Severity
5
CVSS
(AV:L/AC:L/Au:S/C:C/I:N/A:N)
Published
10/21/2024
Created
11/21/2024
Added
11/19/2024
Modified
02/11/2025

Description

In the Linux kernel, the following vulnerability has been resolved: igb: Initialize mailbox message for VF reset When a MAC address is not assigned to the VF, that portion of the message sent to the VF is not set. The memory, however, is allocated from the stack meaning that information may be leaked to the VM. Initialize the message buffer to 0 so that no information is passed to the VM in this case.

Solution(s)

  • ubuntu-upgrade-linux
  • ubuntu-upgrade-linux-aws
  • ubuntu-upgrade-linux-aws-5-15
  • ubuntu-upgrade-linux-aws-5-4
  • ubuntu-upgrade-linux-aws-fips
  • ubuntu-upgrade-linux-aws-hwe
  • ubuntu-upgrade-linux-azure
  • ubuntu-upgrade-linux-azure-4-15
  • ubuntu-upgrade-linux-azure-5-15
  • ubuntu-upgrade-linux-azure-5-4
  • ubuntu-upgrade-linux-azure-fde
  • ubuntu-upgrade-linux-azure-fde-5-15
  • ubuntu-upgrade-linux-azure-fips
  • ubuntu-upgrade-linux-bluefield
  • ubuntu-upgrade-linux-fips
  • ubuntu-upgrade-linux-gcp
  • ubuntu-upgrade-linux-gcp-4-15
  • ubuntu-upgrade-linux-gcp-5-15
  • ubuntu-upgrade-linux-gcp-5-4
  • ubuntu-upgrade-linux-gcp-fips
  • ubuntu-upgrade-linux-gke
  • ubuntu-upgrade-linux-gkeop
  • ubuntu-upgrade-linux-gkeop-5-15
  • ubuntu-upgrade-linux-hwe
  • ubuntu-upgrade-linux-hwe-5-15
  • ubuntu-upgrade-linux-hwe-5-4
  • ubuntu-upgrade-linux-ibm
  • ubuntu-upgrade-linux-ibm-5-4
  • ubuntu-upgrade-linux-intel-iot-realtime
  • ubuntu-upgrade-linux-intel-iotg
  • ubuntu-upgrade-linux-intel-iotg-5-15
  • ubuntu-upgrade-linux-iot
  • ubuntu-upgrade-linux-kvm
  • ubuntu-upgrade-linux-lowlatency
  • ubuntu-upgrade-linux-lowlatency-hwe-5-15
  • ubuntu-upgrade-linux-nvidia
  • ubuntu-upgrade-linux-oracle
  • ubuntu-upgrade-linux-oracle-5-15
  • ubuntu-upgrade-linux-oracle-5-4
  • ubuntu-upgrade-linux-raspi
  • ubuntu-upgrade-linux-raspi-5-4
  • ubuntu-upgrade-linux-realtime
  • ubuntu-upgrade-linux-riscv-5-15
  • ubuntu-upgrade-linux-xilinx-zynqmp

References

  • https://attackerkb.com/topics/cve-2022-48949
  • CVE - 2022-48949
  • https://git.kernel.org/linus/de5dc44370fbd6b46bd7f1a1e00369be54a041c8
  • https://git.kernel.org/stable/c/367e1e3399dbc56fc669740c4ab60e35da632b0e
  • https://git.kernel.org/stable/c/51fd5ede7ed42f272682a0c33d6f0767b3484a3d
  • https://git.kernel.org/stable/c/a6629659af3f5c6a91e3914ea62554c975ab77f4
  • https://git.kernel.org/stable/c/c383c7c35c7bc15e07a04eefa060a8a80cbeae29
  • https://git.kernel.org/stable/c/c581439a977545d61849a72e8ed631cfc8a2a3c1
  • https://git.kernel.org/stable/c/de5dc44370fbd6b46bd7f1a1e00369be54a041c8
  • https://git.kernel.org/stable/c/ef1d739dd1f362aec081278ff92f943c31eb177a
  • https://git.kernel.org/stable/c/f2479c3daaabccbac6c343a737615d0c595c6dc4
  • https://www.cve.org/CVERecord?id=CVE-2022-48949
View more
  • 查看数 692
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。

游客
回帖…