CVE-2022-48966
21.10.2024, 20:15
In the Linux kernel, the following vulnerability has been resolved: net: mvneta: Prevent out of bounds read in mvneta_config_rss() The pp->indir[0] value comes from the user. It is passed to: if (cpu_online(pp->rxq_def)) inside the mvneta_percpu_elect() function. It needs bounds checkeding to ensure that it is not beyond the end of the cpu bitmap.Enginsight
Vendor | Product | Version |
---|---|---|
linux | linux_kernel | 4.5 ≤ 𝑥 < 4.9.336 |
linux | linux_kernel | 4.10 ≤ 𝑥 < 4.14.302 |
linux | linux_kernel | 4.15 ≤ 𝑥 < 4.19.269 |
linux | linux_kernel | 4.20 ≤ 𝑥 < 5.4.227 |
linux | linux_kernel | 5.5 ≤ 𝑥 < 5.10.159 |
linux | linux_kernel | 5.11 ≤ 𝑥 < 5.15.83 |
linux | linux_kernel | 5.16 ≤ 𝑥 < 6.0.13 |
linux | linux_kernel | 6.1:rc1 |
linux | linux_kernel | 6.1:rc2 |
linux | linux_kernel | 6.1:rc3 |
linux | linux_kernel | 6.1:rc4 |
linux | linux_kernel | 6.1:rc5 |
linux | linux_kernel | 6.1:rc6 |
linux | linux_kernel | 6.1:rc7 |
linux | linux_kernel | 6.1:rc8 |
𝑥
= Vulnerable software versions

Debian Releases
Common Weakness Enumeration
References