First published: Tue Jul 16 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: xprtrdma: fix pointer derefs in error cases of rpcrdma_ep_create If there are failures then we must not leave the non-NULL pointers with the error value, otherwise `rpcrdma_ep_destroy` gets confused and tries free them, resulting in an Oops.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <5.10.102 | 5.10.102 |
redhat/kernel | <5.15.25 | 5.15.25 |
redhat/kernel | <5.16.11 | 5.16.11 |
redhat/kernel | <5.17 | 5.17 |
Linux kernel | <5.10.102 | |
Linux kernel | >=5.11<5.15.25 | |
Linux kernel | >=5.16<5.16.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-48773 is classified as a medium severity vulnerability in the Linux kernel.
To fix CVE-2022-48773, you need to update the Linux kernel to versions 5.10.102, 5.15.25, 5.16.11, or 5.17.
CVE-2022-48773 affects Linux kernel versions prior to 5.10.102, between 5.11 and 5.15.25, and between 5.16.0 and 5.16.11.
CVE-2022-48773 affects the xprtrdma component in the Linux kernel.
The impact of CVE-2022-48773 may lead to confusion in pointer dereferencing during error handling in the rpcrdma_ep_create function.