In the Linux kernel, the following vulnerability has been resolved:
net: amd-xgbe: Fix skb data length underflow
There will be BUG_ON() triggered in include/linux/skbuff.h leading to
intermittent kernel panic, when the skb length underflow is detected.
Fix this by dropping the packet if such length underflows are seen
because of inconsistencies in the hardware descriptors.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 07:33
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/34aeb4da20f93ac80a6291a2dbe7b9c6460e9b26 - Mailing List, Patch | |
References | () https://git.kernel.org/stable/c/4d3fcfe8464838b3920bc2b939d888e0b792934e - Mailing List, Patch | |
References | () https://git.kernel.org/stable/c/5aac9108a180fc06e28d4e7fb00247ce603b72ee - Mailing List, Patch | |
References | () https://git.kernel.org/stable/c/617f9934bb37993b9813832516f318ba874bcb7d - Mailing List, Patch | |
References | () https://git.kernel.org/stable/c/9892742f035f7aa7dcd2bb0750effa486db89576 - Mailing List, Patch | |
References | () https://git.kernel.org/stable/c/9924c80bd484340191e586110ca22bff23a49f2e - Mailing List, Patch | |
References | () https://git.kernel.org/stable/c/db6fd92316a254be2097556f01bccecf560e53ce - Mailing List, Patch | |
References | () https://git.kernel.org/stable/c/e8f73f620fee5f52653ed2da360121e4446575c5 - Mailing List, Patch |
20 Aug 2024, 13:54
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
CWE | CWE-787 | |
First Time |
Linux linux Kernel
Linux |
|
References | () https://git.kernel.org/stable/c/34aeb4da20f93ac80a6291a2dbe7b9c6460e9b26 - Mailing List, Patch | |
References | () https://git.kernel.org/stable/c/4d3fcfe8464838b3920bc2b939d888e0b792934e - Mailing List, Patch | |
References | () https://git.kernel.org/stable/c/5aac9108a180fc06e28d4e7fb00247ce603b72ee - Mailing List, Patch | |
References | () https://git.kernel.org/stable/c/617f9934bb37993b9813832516f318ba874bcb7d - Mailing List, Patch | |
References | () https://git.kernel.org/stable/c/9892742f035f7aa7dcd2bb0750effa486db89576 - Mailing List, Patch | |
References | () https://git.kernel.org/stable/c/9924c80bd484340191e586110ca22bff23a49f2e - Mailing List, Patch | |
References | () https://git.kernel.org/stable/c/db6fd92316a254be2097556f01bccecf560e53ce - Mailing List, Patch | |
References | () https://git.kernel.org/stable/c/e8f73f620fee5f52653ed2da360121e4446575c5 - Mailing List, Patch | |
Summary |
|
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
20 Jun 2024, 12:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-06-20 12:15
Updated : 2024-11-21 07:33
NVD link : CVE-2022-48743
Mitre link : CVE-2022-48743
CVE.ORG link : CVE-2022-48743
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-787
Out-of-bounds Write