In the Linux kernel, the following vulnerability has been resolved:
nvme-tcp: fix UAF when detecting digest errors
We should also bail from the iowork loop when we set rdenabled to true, so we don't attempt to read data from the socket when the TCP stream is already out-of-sync or corrupted.
[
{
"digest": {
"length": 700.0,
"function_hash": "168982766006243367231625759101312352525"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@19816a0214684f70b49b25075ff8c402fdd611d3",
"deprecated": false,
"signature_version": "v1",
"id": "CVE-2022-48686-07308492",
"signature_type": "Function",
"target": {
"file": "drivers/nvme/host/tcp.c",
"function": "nvme_tcp_io_work"
}
},
{
"digest": {
"length": 626.0,
"function_hash": "232410063186299585922606213906252736168"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c3eb461aa56e6fa94fb80442ba2586bd223a8886",
"deprecated": false,
"signature_version": "v1",
"id": "CVE-2022-48686-54dbd368",
"signature_type": "Function",
"target": {
"file": "drivers/nvme/host/tcp.c",
"function": "nvme_tcp_io_work"
}
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"335599616313355786229907082337084548113",
"149593864322723798738984492007334955843",
"90264109497734089417546555852687493728",
"301162440628877404723987645591260182675"
]
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@160f3549a907a50e51a8518678ba2dcf2541abea",
"deprecated": false,
"signature_version": "v1",
"id": "CVE-2022-48686-5f97af6c",
"signature_type": "Line",
"target": {
"file": "drivers/nvme/host/tcp.c"
}
},
{
"digest": {
"length": 626.0,
"function_hash": "232410063186299585922606213906252736168"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@160f3549a907a50e51a8518678ba2dcf2541abea",
"deprecated": false,
"signature_version": "v1",
"id": "CVE-2022-48686-b738af36",
"signature_type": "Function",
"target": {
"file": "drivers/nvme/host/tcp.c",
"function": "nvme_tcp_io_work"
}
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"42302011341207467811419581437261770710",
"229419610006247656931111546604071066402",
"26929118570458344837575002045217434544",
"301162440628877404723987645591260182675"
]
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@19816a0214684f70b49b25075ff8c402fdd611d3",
"deprecated": false,
"signature_version": "v1",
"id": "CVE-2022-48686-e2282816",
"signature_type": "Line",
"target": {
"file": "drivers/nvme/host/tcp.c"
}
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"335599616313355786229907082337084548113",
"149593864322723798738984492007334955843",
"90264109497734089417546555852687493728",
"301162440628877404723987645591260182675"
]
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c3eb461aa56e6fa94fb80442ba2586bd223a8886",
"deprecated": false,
"signature_version": "v1",
"id": "CVE-2022-48686-fd30a77e",
"signature_type": "Line",
"target": {
"file": "drivers/nvme/host/tcp.c"
}
}
]