In the Linux kernel, the following vulnerability has been resolved:
net: amd-xgbe: Fix skb data length underflow
There will be BUG_ON() triggered in include/linux/skbuff.h leading to intermittent kernel panic, when the skb length underflow is detected.
Fix this by dropping the packet if such length underflows are seen because of inconsistencies in the hardware descriptors.
[ { "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9892742f035f7aa7dcd2bb0750effa486db89576", "signature_type": "Line", "digest": { "line_hashes": [ "167765963603334908320678666351206414549", "49873822996748375504248927216107337709", "273624659939797289381467502789267348167", "157353341767818353561900056726025145295", "272969981192696187021223348684423453580", "264620672307400809437938203249324633081", "307511554556577000475987599314292928835", "84383514884120552565609747521474445021" ], "threshold": 0.9 }, "id": "CVE-2022-48743-065fcebd", "target": { "file": "drivers/net/ethernet/amd/xgbe/xgbe-drv.c" }, "signature_version": "v1" }, { "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@db6fd92316a254be2097556f01bccecf560e53ce", "signature_type": "Line", "digest": { "line_hashes": [ "167765963603334908320678666351206414549", "49873822996748375504248927216107337709", "273624659939797289381467502789267348167", "157353341767818353561900056726025145295", "272969981192696187021223348684423453580", "264620672307400809437938203249324633081", "307511554556577000475987599314292928835", "84383514884120552565609747521474445021" ], "threshold": 0.9 }, "id": "CVE-2022-48743-6f23c4bf", "target": { "file": "drivers/net/ethernet/amd/xgbe/xgbe-drv.c" }, "signature_version": "v1" }, { "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9892742f035f7aa7dcd2bb0750effa486db89576", "signature_type": "Function", "digest": { "length": 3685.0, "function_hash": "120616661619904522130361467248488013567" }, "id": "CVE-2022-48743-a9ce1511", "target": { "file": "drivers/net/ethernet/amd/xgbe/xgbe-drv.c", "function": "xgbe_rx_poll" }, "signature_version": "v1" }, { "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5aac9108a180fc06e28d4e7fb00247ce603b72ee", "signature_type": "Line", "digest": { "line_hashes": [ "167765963603334908320678666351206414549", "49873822996748375504248927216107337709", "273624659939797289381467502789267348167", "157353341767818353561900056726025145295", "272969981192696187021223348684423453580", "264620672307400809437938203249324633081", "307511554556577000475987599314292928835", "84383514884120552565609747521474445021" ], "threshold": 0.9 }, "id": "CVE-2022-48743-adcce14c", "target": { "file": "drivers/net/ethernet/amd/xgbe/xgbe-drv.c" }, "signature_version": "v1" }, { "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@db6fd92316a254be2097556f01bccecf560e53ce", "signature_type": "Function", "digest": { "length": 3685.0, "function_hash": "120616661619904522130361467248488013567" }, "id": "CVE-2022-48743-d6a0ad76", "target": { "file": "drivers/net/ethernet/amd/xgbe/xgbe-drv.c", "function": "xgbe_rx_poll" }, "signature_version": "v1" }, { "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5aac9108a180fc06e28d4e7fb00247ce603b72ee", "signature_type": "Function", "digest": { "length": 3685.0, "function_hash": "120616661619904522130361467248488013567" }, "id": "CVE-2022-48743-e1531fc4", "target": { "file": "drivers/net/ethernet/amd/xgbe/xgbe-drv.c", "function": "xgbe_rx_poll" }, "signature_version": "v1" } ]