CVE-2022-24448
Published on: 02/04/2022 12:00:00 AM UTC
Last Modified on: 05/12/2022 08:03:00 PM UTC
Certain versions of Debian Linux from Debian contain the following vulnerability:
An issue was discovered in fs/nfs/dir.c in the Linux kernel before 5.16.5. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should occur, but the server instead returns uninitialized data in the file descriptor.
- CVE-2022-24448 has been assigned by
[email protected] to track the vulnerability - currently rated as LOW severity.
CVSS3 Score: 3.3 - LOW
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
LOCAL | LOW | LOW | NONE |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
UNCHANGED | LOW | NONE | NONE |
CVSS2 Score: 1.9 - LOW
Access Vector ⓘ |
Access Complexity |
Authentication |
---|---|---|
LOCAL | MEDIUM | NONE |
Confidentiality Impact |
Integrity Impact |
Availability Impact |
PARTIAL | NONE | NONE |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
kernel/git/torvalds/linux.git - Linux kernel source tree | git.kernel.org text/html |
![]() |
cdn.kernel.org text/plain |
![]() | |
[SECURITY] [DLA 2941-1] linux-4.19 security update | lists.debian.org text/html |
![]() |
[SECURITY] [DLA 2940-1] linux security update | lists.debian.org text/html |
![]() |
[PATCH 5.16 114/200] NFSv4: Handle case where the lookup of a directory fails — Linux Stable Kernel Updates | www.spinics.net text/html |
![]() |
Revert "NFSv4: Handle the special Linux file open access mode" · torvalds/[email protected] · GitHub | github.com text/html |
![]() |
Debian -- Security Information -- DSA-5096-1 linux | www.debian.org Depreciated Link text/html |
![]() |
[PATCH -next 0/2] fix nfsv4 bugs of opening with O_ACCMODE flag | lore.kernel.org text/html |
![]() |
NFSv4: Handle case where the lookup of a directory fails · torvalds/[email protected] · GitHub | github.com text/html |
![]() |
Debian -- Security Information -- DSA-5092-1 linux | www.debian.org Depreciated Link text/html |
![]() |
Related QID Numbers
- 159754 Oracle Enterprise Linux Security Update for unbreakable enterprise kernel-container (ELSA-2022-9274)
- 159755 Oracle Enterprise Linux Security Update for unbreakable enterprise kernel (ELSA-2022-9273)
- 159760 Oracle Enterprise Linux Security Update for unbreakable enterprise kernel-container (ELSA-2022-9314)
- 159763 Oracle Enterprise Linux Security Update for unbreakable enterprise kernel (ELSA-2022-9313)
- 160210 Oracle Enterprise Linux Security Update for kernel (ELSA-2022-7683)
- 160270 Oracle Enterprise Linux Security Update for kernel (ELSA-2022-8267)
- 179104 Debian Security Update for linux (DSA 5092-1)
- 179117 Debian Security Update for linux (DSA 5096-1)
- 179118 Debian Security Update for linux (DLA 2940-1)
- 179119 Debian Security Update for linux-4.19 (DLA 2941-1)
- 198672 Ubuntu Security Notification for Linux kernel (OEM) Vulnerabilities (USN-5302-1)
- 198745 Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-5383-1)
- 198746 Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-5384-1)
- 198749 Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-5385-1)
- 240815 Red Hat Update for kernel-rt (RHSA-2022:7444)
- 240817 Red Hat Update for kernel security (RHSA-2022:7683)
- 240869 Red Hat Update for kernel-rt (RHSA-2022:7933)
- 240904 Red Hat Update for kernel security (RHSA-2022:8267)
- 353184 Amazon Linux Security Advisory for kernel : ALAS-2022-1571
- 353195 Amazon Linux Security Advisory for kernel : ALAS2-2022-1761
- 376925 Alibaba Cloud Linux Security Update for cloud-kernel (ALINUX3-SA-2022:0125)
- 377124 Alibaba Cloud Linux Security Update for cloud-kernel (ALINUX3-SA-2022:0029)
- 377181 Alibaba Cloud Linux Security Update for cloud-kernel (ALINUX2-SA-2022:0022)
- 671441 EulerOS Security Update for kernel (EulerOS-SA-2022-1366)
- 671611 EulerOS Security Update for kernel (EulerOS-SA-2022-1537)
- 671630 EulerOS Security Update for kernel (EulerOS-SA-2022-1647)
- 671631 EulerOS Security Update for kernel (EulerOS-SA-2022-1661)
- 671724 EulerOS Security Update for kernel (EulerOS-SA-2022-1779)
- 671817 EulerOS Security Update for kernel (EulerOS-SA-2022-1868)
- 751831 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:0768-1)
- 751832 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:0765-1)
- 751833 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:0757-1)
- 751835 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:0767-1)
- 751836 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:0759-1)
- 751837 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:0762-1)
- 751838 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:0766-1)
- 751851 OpenSUSE Security Update for the Linux Kernel (openSUSE-SU-2022:0768-1)
- 751952 OpenSUSE Security Update for Linux Kernel (openSUSE-SU-2022:1039-1)
- 751956 OpenSUSE Security Update for the Linux Kernel (openSUSE-SU-2022:1037-1)
- 752016 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:1039-1)
- 752234 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:2080-1)
- 753348 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:1038-1)
- 753368 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:2079-1)
- 753373 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:1257-1)
- 753422 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:1037-1)
- 900649 Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (8495)
- 900959 Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (8483-1)
- 905876 Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (8495-1)
- 906463 Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (8483-2)
- 940732 AlmaLinux Security Update for kernel (ALSA-2022:7683)
- 940766 AlmaLinux Security Update for kernel-rt (ALSA-2022:7444)
- 940798 AlmaLinux Security Update for kernel (ALSA-2022:8267)
- 940843 AlmaLinux Security Update for kernel-rt (ALSA-2022:7933)
- 960176 Rocky Linux Security Update for kernel-rt (RLSA-2022:7444)
- 960184 Rocky Linux Security Update for kernel (RLSA-2022:7683)
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Operating System | Debian | Debian Linux | 10.0 | All | All | All |
Operating System | Debian | Debian Linux | 11.0 | All | All | All |
Operating System | Debian | Debian Linux | 9.0 | All | All | All |
Operating System | Linux | Linux Kernel | All | All | All | All |
- cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*:
- cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*:
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*:
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*:
No vendor comments have been submitted for this CVE
Social Mentions
Source | Title | Posted (UTC) |
---|---|---|
![]() |
CVE-2022-24448 : An issue was discovered in fs/nfs/dir.c in the #Linux #kernel before 5.16.5. If an application set… twitter.com/i/web/status/1… | 2022-02-04 20:05:10 |
![]() |
CVE-2022-24448 | 2022-02-04 21:38:36 |