In the Linux kernel, the following vulnerability has been resolved:
vdpa/mlx5: add validation for VIRTIO_NET_CTRL_MQ_VQ_PAIRS_SET command
When control vq receives a VIRTIO_NET_CTRL_MQ_VQ_PAIRS_SET command
request from the driver, presently there is no validation against the
number of queue pairs to configure, or even if multiqueue had been
negotiated or not is unverified. This may lead to kernel panic due to
uninitialized resource for the queues were there any bogus request
sent down by untrusted driver. Tie up the loose ends there.
Metrics
Affected Vendors & Products
References
History
Thu, 12 Sep 2024 08:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 11 Sep 2024 13:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 29 Aug 2024 22:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-455 |

Status: PUBLISHED
Assigner: Linux
Published:
Updated: 2024-12-19T08:09:26.343Z
Reserved: 2024-07-16T11:38:08.920Z
Link: CVE-2022-48864

Updated: 2024-08-03T15:25:01.614Z

Status : Modified
Published: 2024-07-16T13:15:13.233
Modified: 2024-11-21T07:34:14.380
Link: CVE-2022-48864
