{"id":"CVE-2022-48949","summary":"igb: Initialize mailbox message for VF reset","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nigb: Initialize mailbox message for VF reset\n\nWhen a MAC address is not assigned to the VF, that portion of the message\nsent to the VF is not set. The memory, however, is allocated from the\nstack meaning that information may be leaked to the VM. Initialize the\nmessage buffer to 0 so that no information is passed to the VM in this\ncase.","modified":"2026-05-12T03:53:29.778032Z","published":"2024-10-21T20:05:37.782Z","related":["SUSE-SU-2024:3983-1","SUSE-SU-2024:3985-1","SUSE-SU-2024:4082-1","SUSE-SU-2024:4100-1","SUSE-SU-2024:4131-1","SUSE-SU-2024:4364-1","SUSE-SU-2025:0034-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/48xxx/CVE-2022-48949.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/367e1e3399dbc56fc669740c4ab60e35da632b0e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/51fd5ede7ed42f272682a0c33d6f0767b3484a3d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a6629659af3f5c6a91e3914ea62554c975ab77f4"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c383c7c35c7bc15e07a04eefa060a8a80cbeae29"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c581439a977545d61849a72e8ed631cfc8a2a3c1"},{"type":"WEB","url":"https://git.kernel.org/stable/c/de5dc44370fbd6b46bd7f1a1e00369be54a041c8"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ef1d739dd1f362aec081278ff92f943c31eb177a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f2479c3daaabccbac6c343a737615d0c595c6dc4"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/48xxx/CVE-2022-48949.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-48949"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"6ddbc4cf1f4d5a3a58b4223c80881f299dae3774"},{"fixed":"a6629659af3f5c6a91e3914ea62554c975ab77f4"},{"fixed":"ef1d739dd1f362aec081278ff92f943c31eb177a"},{"fixed":"c581439a977545d61849a72e8ed631cfc8a2a3c1"},{"fixed":"f2479c3daaabccbac6c343a737615d0c595c6dc4"},{"fixed":"367e1e3399dbc56fc669740c4ab60e35da632b0e"},{"fixed":"51fd5ede7ed42f272682a0c33d6f0767b3484a3d"},{"fixed":"c383c7c35c7bc15e07a04eefa060a8a80cbeae29"},{"fixed":"de5dc44370fbd6b46bd7f1a1e00369be54a041c8"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48949.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"4.0.0"},{"fixed":"4.14.303"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.15.0"},{"fixed":"4.19.270"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.20.0"},{"fixed":"5.4.229"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.5.0"},{"fixed":"5.10.161"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.85"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.0.15"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.1.0"},{"fixed":"6.1.1"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48949.json"}}],"schema_version":"1.7.5"}