CVE-2022-48864

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-48864
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48864.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-48864
Downstream
Related
Published
2024-07-16T12:25:27Z
Modified
2025-10-08T06:40:09.901853Z
Summary
vdpa/mlx5: add validation for VIRTIO_NET_CTRL_MQ_VQ_PAIRS_SET command
Details

In the Linux kernel, the following vulnerability has been resolved:

vdpa/mlx5: add validation for VIRTIONETCTRLMQVQPAIRSSET command

When control vq receives a VIRTIONETCTRLMQVQPAIRSSET command request from the driver, presently there is no validation against the number of queue pairs to configure, or even if multiqueue had been negotiated or not is unverified. This may lead to kernel panic due to uninitialized resource for the queues were there any bogus request sent down by untrusted driver. Tie up the loose ends there.

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
52893733f2c5886fc74be6c386d12b59a3f581df
Fixed
e7e118416465f2ba8b55007e5b789823e101421e
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
52893733f2c5886fc74be6c386d12b59a3f581df
Fixed
9f6effca75626c7a7c7620dabcb1a254ca530230
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
52893733f2c5886fc74be6c386d12b59a3f581df
Fixed
ed0f849fc3a63ed2ddf5e72cdb1de3bdbbb0f8eb

Affected versions

v5.*

v5.15
v5.15-rc1
v5.15-rc2
v5.15-rc3
v5.15-rc4
v5.15-rc5
v5.15-rc6
v5.15-rc7
v5.15.1
v5.15.10
v5.15.11
v5.15.12
v5.15.13
v5.15.14
v5.15.15
v5.15.16
v5.15.17
v5.15.18
v5.15.19
v5.15.2
v5.15.20
v5.15.21
v5.15.22
v5.15.23
v5.15.24
v5.15.25
v5.15.26
v5.15.27
v5.15.28
v5.15.3
v5.15.4
v5.15.5
v5.15.6
v5.15.7
v5.15.8
v5.15.9
v5.16
v5.16-rc1
v5.16-rc2
v5.16-rc3
v5.16-rc4
v5.16-rc5
v5.16-rc6
v5.16-rc7
v5.16-rc8
v5.16.1
v5.16.10
v5.16.11
v5.16.12
v5.16.13
v5.16.14
v5.16.2
v5.16.3
v5.16.4
v5.16.5
v5.16.6
v5.16.7
v5.16.8
v5.16.9
v5.17-rc1
v5.17-rc2
v5.17-rc3
v5.17-rc4
v5.17-rc5
v5.17-rc6

Database specific

{
    "vanir_signatures": [
        {
            "signature_version": "v1",
            "digest": {
                "threshold": 0.9,
                "line_hashes": [
                    "118413469054194242167761835777333175353",
                    "278882059502457113959889769422342810988",
                    "153872466016305949769269057118799313634",
                    "255602482327211808672048943060040443992",
                    "29557105064035431318383141583139487858",
                    "202060140871560228889392577548141568956",
                    "285194919042451352548709248270730810960",
                    "295446768787680507476874222845752110097"
                ]
            },
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ed0f849fc3a63ed2ddf5e72cdb1de3bdbbb0f8eb",
            "deprecated": false,
            "target": {
                "file": "drivers/vdpa/mlx5/net/mlx5_vnet.c"
            },
            "signature_type": "Line",
            "id": "CVE-2022-48864-171c8f5e"
        },
        {
            "signature_version": "v1",
            "digest": {
                "threshold": 0.9,
                "line_hashes": [
                    "118413469054194242167761835777333175353",
                    "278882059502457113959889769422342810988",
                    "153872466016305949769269057118799313634",
                    "255602482327211808672048943060040443992",
                    "29557105064035431318383141583139487858",
                    "202060140871560228889392577548141568956",
                    "285194919042451352548709248270730810960",
                    "295446768787680507476874222845752110097"
                ]
            },
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9f6effca75626c7a7c7620dabcb1a254ca530230",
            "deprecated": false,
            "target": {
                "file": "drivers/vdpa/mlx5/net/mlx5_vnet.c"
            },
            "signature_type": "Line",
            "id": "CVE-2022-48864-449235df"
        },
        {
            "signature_version": "v1",
            "digest": {
                "threshold": 0.9,
                "line_hashes": [
                    "118413469054194242167761835777333175353",
                    "278882059502457113959889769422342810988",
                    "153872466016305949769269057118799313634",
                    "255602482327211808672048943060040443992",
                    "29557105064035431318383141583139487858",
                    "202060140871560228889392577548141568956",
                    "285194919042451352548709248270730810960",
                    "295446768787680507476874222845752110097"
                ]
            },
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e7e118416465f2ba8b55007e5b789823e101421e",
            "deprecated": false,
            "target": {
                "file": "drivers/vdpa/mlx5/net/mlx5_vnet.c"
            },
            "signature_type": "Line",
            "id": "CVE-2022-48864-6b5f1b9a"
        },
        {
            "signature_version": "v1",
            "digest": {
                "length": 591.0,
                "function_hash": "22302772013202068930841945231422649274"
            },
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ed0f849fc3a63ed2ddf5e72cdb1de3bdbbb0f8eb",
            "deprecated": false,
            "target": {
                "file": "drivers/vdpa/mlx5/net/mlx5_vnet.c",
                "function": "handle_ctrl_mq"
            },
            "signature_type": "Function",
            "id": "CVE-2022-48864-80040c56"
        },
        {
            "signature_version": "v1",
            "digest": {
                "length": 624.0,
                "function_hash": "236807534869165830063771632082403935555"
            },
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e7e118416465f2ba8b55007e5b789823e101421e",
            "deprecated": false,
            "target": {
                "file": "drivers/vdpa/mlx5/net/mlx5_vnet.c",
                "function": "handle_ctrl_mq"
            },
            "signature_type": "Function",
            "id": "CVE-2022-48864-a705f95f"
        },
        {
            "signature_version": "v1",
            "digest": {
                "length": 624.0,
                "function_hash": "236807534869165830063771632082403935555"
            },
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9f6effca75626c7a7c7620dabcb1a254ca530230",
            "deprecated": false,
            "target": {
                "file": "drivers/vdpa/mlx5/net/mlx5_vnet.c",
                "function": "handle_ctrl_mq"
            },
            "signature_type": "Function",
            "id": "CVE-2022-48864-d82100da"
        }
    ]
}

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.15.0
Fixed
5.15.29
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
5.16.15