{"uuid": "06eb53b8-775e-4211-8244-3f279469545f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-48864", "type": "seen", "source": "https://t.me/cvedetector/950", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2022-48864 - \"Melanox VDPA Linux Kernel Unvalidated Queue Pair Configuration Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2022-48864 \nPublished : July 16, 2024, 1:15 p.m. | 37\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nvdpa/mlx5: add validation for VIRTIO_NET_CTRL_MQ_VQ_PAIRS_SET command  \n  \nWhen control vq receives a VIRTIO_NET_CTRL_MQ_VQ_PAIRS_SET command  \nrequest from the driver, presently there is no validation against the  \nnumber of queue pairs to configure, or even if multiqueue had been  \nnegotiated or not is unverified. This may lead to kernel panic due to  \nuninitialized resource for the queues were there any bogus request  \nsent down by untrusted driver. Tie up the loose ends there. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-16T16:16:47.000000Z"}