In the Linux kernel, the following vulnerability has been resolved:
net: amd-xgbe: Fix skb data length underflow
There will be BUG_ON() triggered in include/linux/skbuff.h leading to
intermittent kernel panic, when the skb length underflow is detected.
Fix this by dropping the packet if such length underflows are seen
because of inconsistencies in the hardware descriptors.
References
Link | Resource |
---|---|
https://git.kernel.org/stable/c/34aeb4da20f93ac80a6291a2dbe7b9c6460e9b26 | Mailing List Patch |
https://git.kernel.org/stable/c/4d3fcfe8464838b3920bc2b939d888e0b792934e | Mailing List Patch |
https://git.kernel.org/stable/c/5aac9108a180fc06e28d4e7fb00247ce603b72ee | Mailing List Patch |
https://git.kernel.org/stable/c/617f9934bb37993b9813832516f318ba874bcb7d | Mailing List Patch |
https://git.kernel.org/stable/c/9892742f035f7aa7dcd2bb0750effa486db89576 | Mailing List Patch |
https://git.kernel.org/stable/c/9924c80bd484340191e586110ca22bff23a49f2e | Mailing List Patch |
https://git.kernel.org/stable/c/db6fd92316a254be2097556f01bccecf560e53ce | Mailing List Patch |
https://git.kernel.org/stable/c/e8f73f620fee5f52653ed2da360121e4446575c5 | Mailing List Patch |
Configurations
Configuration 1 (hide)
|
History
20 Aug 2024, 13:54
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-787 | |
First Time |
Linux linux Kernel
Linux |
|
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
Summary |
|
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
References | () https://git.kernel.org/stable/c/34aeb4da20f93ac80a6291a2dbe7b9c6460e9b26 - Mailing List, Patch | |
References | () https://git.kernel.org/stable/c/4d3fcfe8464838b3920bc2b939d888e0b792934e - Mailing List, Patch | |
References | () https://git.kernel.org/stable/c/5aac9108a180fc06e28d4e7fb00247ce603b72ee - Mailing List, Patch | |
References | () https://git.kernel.org/stable/c/617f9934bb37993b9813832516f318ba874bcb7d - Mailing List, Patch | |
References | () https://git.kernel.org/stable/c/9892742f035f7aa7dcd2bb0750effa486db89576 - Mailing List, Patch | |
References | () https://git.kernel.org/stable/c/9924c80bd484340191e586110ca22bff23a49f2e - Mailing List, Patch | |
References | () https://git.kernel.org/stable/c/db6fd92316a254be2097556f01bccecf560e53ce - Mailing List, Patch | |
References | () https://git.kernel.org/stable/c/e8f73f620fee5f52653ed2da360121e4446575c5 - Mailing List, Patch |
20 Jun 2024, 12:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-06-20 12:15
Updated : 2024-08-20 13:54
NVD link : CVE-2022-48743
Mitre link : CVE-2022-48743
CVE.ORG link : CVE-2022-48743
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-787
Out-of-bounds Write