In the Linux kernel, the following vulnerability has been resolved:
nvme-tcp: fix UAF when detecting digest errors
We should also bail from the iowork loop when we set rdenabled to true, so we don't attempt to read data from the socket when the TCP stream is already out-of-sync or corrupted.
{ "vanir_signatures": [ { "signature_version": "v1", "id": "CVE-2022-48686-07308492", "digest": { "length": 700.0, "function_hash": "168982766006243367231625759101312352525" }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@19816a0214684f70b49b25075ff8c402fdd611d3", "signature_type": "Function", "target": { "function": "nvme_tcp_io_work", "file": "drivers/nvme/host/tcp.c" } }, { "signature_version": "v1", "id": "CVE-2022-48686-37f63fa5", "digest": { "length": 626.0, "function_hash": "232410063186299585922606213906252736168" }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@13c80a6c112467bab5e44d090767930555fc17a5", "signature_type": "Function", "target": { "function": "nvme_tcp_io_work", "file": "drivers/nvme/host/tcp.c" } }, { "signature_version": "v1", "id": "CVE-2022-48686-3cfbf38f", "digest": { "threshold": 0.9, "line_hashes": [ "335599616313355786229907082337084548113", "149593864322723798738984492007334955843", "90264109497734089417546555852687493728", "301162440628877404723987645591260182675" ] }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5914fa32ef1b7766fea933f9eed94ac5c00aa7ff", "signature_type": "Line", "target": { "file": "drivers/nvme/host/tcp.c" } }, { "signature_version": "v1", "id": "CVE-2022-48686-3d923c9e", "digest": { "length": 626.0, "function_hash": "232410063186299585922606213906252736168" }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5914fa32ef1b7766fea933f9eed94ac5c00aa7ff", "signature_type": "Function", "target": { "function": "nvme_tcp_io_work", "file": "drivers/nvme/host/tcp.c" } }, { "signature_version": "v1", "id": "CVE-2022-48686-54dbd368", "digest": { "length": 626.0, "function_hash": "232410063186299585922606213906252736168" }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c3eb461aa56e6fa94fb80442ba2586bd223a8886", "signature_type": "Function", "target": { "function": "nvme_tcp_io_work", "file": "drivers/nvme/host/tcp.c" } }, { "signature_version": "v1", "id": "CVE-2022-48686-5f97af6c", "digest": { "threshold": 0.9, "line_hashes": [ "335599616313355786229907082337084548113", "149593864322723798738984492007334955843", "90264109497734089417546555852687493728", "301162440628877404723987645591260182675" ] }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@160f3549a907a50e51a8518678ba2dcf2541abea", "signature_type": "Line", "target": { "file": "drivers/nvme/host/tcp.c" } }, { "signature_version": "v1", "id": "CVE-2022-48686-ac1a6a74", "digest": { "threshold": 0.9, "line_hashes": [ "335599616313355786229907082337084548113", "149593864322723798738984492007334955843", "90264109497734089417546555852687493728", "301162440628877404723987645591260182675" ] }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@13c80a6c112467bab5e44d090767930555fc17a5", "signature_type": "Line", "target": { "file": "drivers/nvme/host/tcp.c" } }, { "signature_version": "v1", "id": "CVE-2022-48686-b738af36", "digest": { "length": 626.0, "function_hash": "232410063186299585922606213906252736168" }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@160f3549a907a50e51a8518678ba2dcf2541abea", "signature_type": "Function", "target": { "function": "nvme_tcp_io_work", "file": "drivers/nvme/host/tcp.c" } }, { "signature_version": "v1", "id": "CVE-2022-48686-e2282816", "digest": { "threshold": 0.9, "line_hashes": [ "42302011341207467811419581437261770710", "229419610006247656931111546604071066402", "26929118570458344837575002045217434544", "301162440628877404723987645591260182675" ] }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@19816a0214684f70b49b25075ff8c402fdd611d3", "signature_type": "Line", "target": { "file": "drivers/nvme/host/tcp.c" } }, { "signature_version": "v1", "id": "CVE-2022-48686-fd30a77e", "digest": { "threshold": 0.9, "line_hashes": [ "335599616313355786229907082337084548113", "149593864322723798738984492007334955843", "90264109497734089417546555852687493728", "301162440628877404723987645591260182675" ] }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c3eb461aa56e6fa94fb80442ba2586bd223a8886", "signature_type": "Line", "target": { "file": "drivers/nvme/host/tcp.c" } } ] }