CVE-2022-48882
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
21/08/2024
Last modified:
29/08/2024
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
net/mlx5e: Fix macsec possible null dereference when updating MAC security entity (SecY)<br />
<br />
Upon updating MAC security entity (SecY) in hw offload path, the macsec<br />
security association (SA) initialization routine is called. In case of<br />
extended packet number (epn) is enabled the salt and ssci attributes are<br />
retrieved using the MACsec driver rx_sa context which is unavailable when<br />
updating a SecY property such as encoding-sa hence the null dereference.<br />
Fix by using the provided SA to set those attributes.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.1 (including) | 6.1.7 (excluding) |
To consult the complete list of CPE names with products and versions, see this page