Lucene search

K
cveLinuxCVE-2022-48743
HistoryJun 20, 2024 - 12:15 p.m.

CVE-2022-48743

2024-06-2012:15:12
CWE-787
Linux
web.nvd.nist.gov
30
linux kernel
vulnerability
cve-2022-48743
skb data length underflow
amd-xgbe driver
intermittent kernel panic
hardware descriptors

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

AI Score

6.4

Confidence

Low

EPSS

0

Percentile

5.0%

In the Linux kernel, the following vulnerability has been resolved:

net: amd-xgbe: Fix skb data length underflow

There will be BUG_ON() triggered in include/linux/skbuff.h leading to
intermittent kernel panic, when the skb length underflow is detected.

Fix this by dropping the packet if such length underflows are seen
because of inconsistencies in the hardware descriptors.

Affected configurations

Nvd
Vulners
Node
linuxlinux_kernelRange4.9.194.9.300
OR
linuxlinux_kernelRange4.114.14.265
OR
linuxlinux_kernelRange4.154.19.228
OR
linuxlinux_kernelRange4.205.4.177
OR
linuxlinux_kernelRange5.55.10.97
OR
linuxlinux_kernelRange5.115.15.20
OR
linuxlinux_kernelRange5.165.16.6
VendorProductVersionCPE
linuxlinux_kernel*cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "Linux",
    "vendor": "Linux",
    "defaultStatus": "unaffected",
    "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
    "programFiles": [
      "drivers/net/ethernet/amd/xgbe/xgbe-drv.c"
    ],
    "versions": [
      {
        "version": "fafc9555d87a",
        "lessThan": "9924c80bd484",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "622c36f143fc",
        "lessThan": "617f9934bb37",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "622c36f143fc",
        "lessThan": "34aeb4da20f9",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "622c36f143fc",
        "lessThan": "9892742f035f",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "622c36f143fc",
        "lessThan": "4d3fcfe84648",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "622c36f143fc",
        "lessThan": "db6fd92316a2",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "622c36f143fc",
        "lessThan": "e8f73f620fee",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "622c36f143fc",
        "lessThan": "5aac9108a180",
        "status": "affected",
        "versionType": "git"
      }
    ]
  },
  {
    "product": "Linux",
    "vendor": "Linux",
    "defaultStatus": "affected",
    "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
    "programFiles": [
      "drivers/net/ethernet/amd/xgbe/xgbe-drv.c"
    ],
    "versions": [
      {
        "version": "4.11",
        "status": "affected"
      },
      {
        "version": "0",
        "lessThan": "4.11",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "4.9.300",
        "lessThanOrEqual": "4.9.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "4.14.265",
        "lessThanOrEqual": "4.14.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "4.19.228",
        "lessThanOrEqual": "4.19.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "5.4.177",
        "lessThanOrEqual": "5.4.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "5.10.97",
        "lessThanOrEqual": "5.10.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "5.15.20",
        "lessThanOrEqual": "5.15.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "5.16.6",
        "lessThanOrEqual": "5.16.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "5.17",
        "lessThanOrEqual": "*",
        "status": "unaffected",
        "versionType": "original_commit_for_fix"
      }
    ]
  }
]

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

AI Score

6.4

Confidence

Low

EPSS

0

Percentile

5.0%