CVE-2022-48743 (GCVE-0-2022-48743)
Vulnerability from cvelistv5
Published
2024-06-20 11:13
Modified
2025-05-04 12:43
Summary
In the Linux kernel, the following vulnerability has been resolved: net: amd-xgbe: Fix skb data length underflow There will be BUG_ON() triggered in include/linux/skbuff.h leading to intermittent kernel panic, when the skb length underflow is detected. Fix this by dropping the packet if such length underflows are seen because of inconsistencies in the hardware descriptors.
References
416baaa9-dc9f-4396-8d5f-8c081fb06d67 https://git.kernel.org/stable/c/34aeb4da20f93ac80a6291a2dbe7b9c6460e9b26 Mailing List, Patch
416baaa9-dc9f-4396-8d5f-8c081fb06d67 https://git.kernel.org/stable/c/4d3fcfe8464838b3920bc2b939d888e0b792934e Mailing List, Patch
416baaa9-dc9f-4396-8d5f-8c081fb06d67 https://git.kernel.org/stable/c/5aac9108a180fc06e28d4e7fb00247ce603b72ee Mailing List, Patch
416baaa9-dc9f-4396-8d5f-8c081fb06d67 https://git.kernel.org/stable/c/617f9934bb37993b9813832516f318ba874bcb7d Mailing List, Patch
416baaa9-dc9f-4396-8d5f-8c081fb06d67 https://git.kernel.org/stable/c/9892742f035f7aa7dcd2bb0750effa486db89576 Mailing List, Patch
416baaa9-dc9f-4396-8d5f-8c081fb06d67 https://git.kernel.org/stable/c/9924c80bd484340191e586110ca22bff23a49f2e Mailing List, Patch
416baaa9-dc9f-4396-8d5f-8c081fb06d67 https://git.kernel.org/stable/c/db6fd92316a254be2097556f01bccecf560e53ce Mailing List, Patch
416baaa9-dc9f-4396-8d5f-8c081fb06d67 https://git.kernel.org/stable/c/e8f73f620fee5f52653ed2da360121e4446575c5 Mailing List, Patch
af854a3a-2127-422b-91ae-364da2661108 https://git.kernel.org/stable/c/34aeb4da20f93ac80a6291a2dbe7b9c6460e9b26 Mailing List, Patch
af854a3a-2127-422b-91ae-364da2661108 https://git.kernel.org/stable/c/4d3fcfe8464838b3920bc2b939d888e0b792934e Mailing List, Patch
af854a3a-2127-422b-91ae-364da2661108 https://git.kernel.org/stable/c/5aac9108a180fc06e28d4e7fb00247ce603b72ee Mailing List, Patch
af854a3a-2127-422b-91ae-364da2661108 https://git.kernel.org/stable/c/617f9934bb37993b9813832516f318ba874bcb7d Mailing List, Patch
af854a3a-2127-422b-91ae-364da2661108 https://git.kernel.org/stable/c/9892742f035f7aa7dcd2bb0750effa486db89576 Mailing List, Patch
af854a3a-2127-422b-91ae-364da2661108 https://git.kernel.org/stable/c/9924c80bd484340191e586110ca22bff23a49f2e Mailing List, Patch
af854a3a-2127-422b-91ae-364da2661108 https://git.kernel.org/stable/c/db6fd92316a254be2097556f01bccecf560e53ce Mailing List, Patch
af854a3a-2127-422b-91ae-364da2661108 https://git.kernel.org/stable/c/e8f73f620fee5f52653ed2da360121e4446575c5 Mailing List, Patch
Impacted products
Vendor Product Version
Linux Linux Version: fafc9555d87a19c78bcd43ed731c3a73bf0b37a9
Version: 622c36f143fc9566ba49d7cec994c2da1182d9e2
Version: 622c36f143fc9566ba49d7cec994c2da1182d9e2
Version: 622c36f143fc9566ba49d7cec994c2da1182d9e2
Version: 622c36f143fc9566ba49d7cec994c2da1182d9e2
Version: 622c36f143fc9566ba49d7cec994c2da1182d9e2
Version: 622c36f143fc9566ba49d7cec994c2da1182d9e2
Version: 622c36f143fc9566ba49d7cec994c2da1182d9e2
Version: ae43f9360a21b35cf785ae9a0fdce524d7af0938
Version: ae9d577f3dbb686862b7d0dc9cc73054f0964d4d
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "LOW",
              "baseScore": 5.3,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "LOW",
              "integrityImpact": "LOW",
              "privilegesRequired": "LOW",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2022-48743",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-06-20T13:32:55.523566Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "description": "CWE-noinfo Not enough information",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-30T15:56:44.967Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T15:25:01.057Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/9924c80bd484340191e586110ca22bff23a49f2e"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/617f9934bb37993b9813832516f318ba874bcb7d"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/34aeb4da20f93ac80a6291a2dbe7b9c6460e9b26"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/9892742f035f7aa7dcd2bb0750effa486db89576"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/4d3fcfe8464838b3920bc2b939d888e0b792934e"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/db6fd92316a254be2097556f01bccecf560e53ce"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/e8f73f620fee5f52653ed2da360121e4446575c5"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/5aac9108a180fc06e28d4e7fb00247ce603b72ee"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/net/ethernet/amd/xgbe/xgbe-drv.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "9924c80bd484340191e586110ca22bff23a49f2e",
              "status": "affected",
              "version": "fafc9555d87a19c78bcd43ed731c3a73bf0b37a9",
              "versionType": "git"
            },
            {
              "lessThan": "617f9934bb37993b9813832516f318ba874bcb7d",
              "status": "affected",
              "version": "622c36f143fc9566ba49d7cec994c2da1182d9e2",
              "versionType": "git"
            },
            {
              "lessThan": "34aeb4da20f93ac80a6291a2dbe7b9c6460e9b26",
              "status": "affected",
              "version": "622c36f143fc9566ba49d7cec994c2da1182d9e2",
              "versionType": "git"
            },
            {
              "lessThan": "9892742f035f7aa7dcd2bb0750effa486db89576",
              "status": "affected",
              "version": "622c36f143fc9566ba49d7cec994c2da1182d9e2",
              "versionType": "git"
            },
            {
              "lessThan": "4d3fcfe8464838b3920bc2b939d888e0b792934e",
              "status": "affected",
              "version": "622c36f143fc9566ba49d7cec994c2da1182d9e2",
              "versionType": "git"
            },
            {
              "lessThan": "db6fd92316a254be2097556f01bccecf560e53ce",
              "status": "affected",
              "version": "622c36f143fc9566ba49d7cec994c2da1182d9e2",
              "versionType": "git"
            },
            {
              "lessThan": "e8f73f620fee5f52653ed2da360121e4446575c5",
              "status": "affected",
              "version": "622c36f143fc9566ba49d7cec994c2da1182d9e2",
              "versionType": "git"
            },
            {
              "lessThan": "5aac9108a180fc06e28d4e7fb00247ce603b72ee",
              "status": "affected",
              "version": "622c36f143fc9566ba49d7cec994c2da1182d9e2",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "ae43f9360a21b35cf785ae9a0fdce524d7af0938",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "ae9d577f3dbb686862b7d0dc9cc73054f0964d4d",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "drivers/net/ethernet/amd/xgbe/xgbe-drv.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "4.11"
            },
            {
              "lessThan": "4.11",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.9.*",
              "status": "unaffected",
              "version": "4.9.300",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.14.*",
              "status": "unaffected",
              "version": "4.14.265",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.19.*",
              "status": "unaffected",
              "version": "4.19.228",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.4.*",
              "status": "unaffected",
              "version": "5.4.177",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.10.*",
              "status": "unaffected",
              "version": "5.10.97",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.20",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.16.*",
              "status": "unaffected",
              "version": "5.16.6",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "5.17",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "4.9.300",
                  "versionStartIncluding": "4.9.19",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "4.14.265",
                  "versionStartIncluding": "4.11",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "4.19.228",
                  "versionStartIncluding": "4.11",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.4.177",
                  "versionStartIncluding": "4.11",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.10.97",
                  "versionStartIncluding": "4.11",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.15.20",
                  "versionStartIncluding": "4.11",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.16.6",
                  "versionStartIncluding": "4.11",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.17",
                  "versionStartIncluding": "4.11",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "4.4.58",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "4.10.7",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: amd-xgbe: Fix skb data length underflow\n\nThere will be BUG_ON() triggered in include/linux/skbuff.h leading to\nintermittent kernel panic, when the skb length underflow is detected.\n\nFix this by dropping the packet if such length underflows are seen\nbecause of inconsistencies in the hardware descriptors."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-04T12:43:38.834Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/9924c80bd484340191e586110ca22bff23a49f2e"
        },
        {
          "url": "https://git.kernel.org/stable/c/617f9934bb37993b9813832516f318ba874bcb7d"
        },
        {
          "url": "https://git.kernel.org/stable/c/34aeb4da20f93ac80a6291a2dbe7b9c6460e9b26"
        },
        {
          "url": "https://git.kernel.org/stable/c/9892742f035f7aa7dcd2bb0750effa486db89576"
        },
        {
          "url": "https://git.kernel.org/stable/c/4d3fcfe8464838b3920bc2b939d888e0b792934e"
        },
        {
          "url": "https://git.kernel.org/stable/c/db6fd92316a254be2097556f01bccecf560e53ce"
        },
        {
          "url": "https://git.kernel.org/stable/c/e8f73f620fee5f52653ed2da360121e4446575c5"
        },
        {
          "url": "https://git.kernel.org/stable/c/5aac9108a180fc06e28d4e7fb00247ce603b72ee"
        }
      ],
      "title": "net: amd-xgbe: Fix skb data length underflow",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2022-48743",
    "datePublished": "2024-06-20T11:13:27.312Z",
    "dateReserved": "2024-06-20T11:09:39.054Z",
    "dateUpdated": "2025-05-04T12:43:38.834Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2022-48743\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-06-20T12:15:12.610\",\"lastModified\":\"2024-11-21T07:33:54.410\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nnet: amd-xgbe: Fix skb data length underflow\\n\\nThere will be BUG_ON() triggered in include/linux/skbuff.h leading to\\nintermittent kernel panic, when the skb length underflow is detected.\\n\\nFix this by dropping the packet if such length underflows are seen\\nbecause of inconsistencies in the hardware descriptors.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: amd-xgbe: corrige el desbordamiento de longitud de datos de skb. Se activar\u00e1 BUG_ON() en include/linux/skbuff.h, lo que provocar\u00e1 un p\u00e1nico intermitente en el kernel, cuando el desbordamiento de longitud de skb sea detectado. Solucione este problema descartando el paquete si se observan desbordamientos de longitud debido a inconsistencias en los descriptores de hardware.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":1.8,\"impactScore\":3.4}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.9.19\",\"versionEndExcluding\":\"4.9.300\",\"matchCriteriaId\":\"43BD120E-4853-49BE-A7FC-3345A55D0070\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.11\",\"versionEndExcluding\":\"4.14.265\",\"matchCriteriaId\":\"E303FBB2-9F13-4FBE-874A-B48C6A56A829\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.15\",\"versionEndExcluding\":\"4.19.228\",\"matchCriteriaId\":\"87288F16-8DE4-4680-95D9-8601B47620D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.20\",\"versionEndExcluding\":\"5.4.177\",\"matchCriteriaId\":\"B42832A3-1D9B-4BE0-8D4C-3AF681B52D98\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.5\",\"versionEndExcluding\":\"5.10.97\",\"matchCriteriaId\":\"FB2BE440-BF07-4C49-9A0C-A63E4FA103A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.11\",\"versionEndExcluding\":\"5.15.20\",\"matchCriteriaId\":\"C68FC5B4-CC13-45E9-8050-EF9025F7A9B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.16\",\"versionEndExcluding\":\"5.16.6\",\"matchCriteriaId\":\"6739D89E-32C3-479D-B5F6-6865C5061FA5\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/34aeb4da20f93ac80a6291a2dbe7b9c6460e9b26\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Mailing List\",\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/4d3fcfe8464838b3920bc2b939d888e0b792934e\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Mailing List\",\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/5aac9108a180fc06e28d4e7fb00247ce603b72ee\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Mailing List\",\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/617f9934bb37993b9813832516f318ba874bcb7d\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Mailing List\",\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/9892742f035f7aa7dcd2bb0750effa486db89576\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Mailing List\",\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/9924c80bd484340191e586110ca22bff23a49f2e\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Mailing List\",\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/db6fd92316a254be2097556f01bccecf560e53ce\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Mailing List\",\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/e8f73f620fee5f52653ed2da360121e4446575c5\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Mailing List\",\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/34aeb4da20f93ac80a6291a2dbe7b9c6460e9b26\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/4d3fcfe8464838b3920bc2b939d888e0b792934e\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/5aac9108a180fc06e28d4e7fb00247ce603b72ee\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/617f9934bb37993b9813832516f318ba874bcb7d\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/9892742f035f7aa7dcd2bb0750effa486db89576\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/9924c80bd484340191e586110ca22bff23a49f2e\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/db6fd92316a254be2097556f01bccecf560e53ce\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/e8f73f620fee5f52653ed2da360121e4446575c5\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Patch\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://git.kernel.org/stable/c/9924c80bd484340191e586110ca22bff23a49f2e\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/617f9934bb37993b9813832516f318ba874bcb7d\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/34aeb4da20f93ac80a6291a2dbe7b9c6460e9b26\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/9892742f035f7aa7dcd2bb0750effa486db89576\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/4d3fcfe8464838b3920bc2b939d888e0b792934e\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/db6fd92316a254be2097556f01bccecf560e53ce\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/e8f73f620fee5f52653ed2da360121e4446575c5\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/5aac9108a180fc06e28d4e7fb00247ce603b72ee\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-03T15:25:01.057Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5.3, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"LOW\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"LOW\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2022-48743\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-06-20T13:32:55.523566Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"description\": \"CWE-noinfo Not enough information\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-06-20T13:33:00.412Z\"}}], \"cna\": {\"title\": \"net: amd-xgbe: Fix skb data length underflow\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"fafc9555d87a19c78bcd43ed731c3a73bf0b37a9\", \"lessThan\": \"9924c80bd484340191e586110ca22bff23a49f2e\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"622c36f143fc9566ba49d7cec994c2da1182d9e2\", \"lessThan\": \"617f9934bb37993b9813832516f318ba874bcb7d\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"622c36f143fc9566ba49d7cec994c2da1182d9e2\", \"lessThan\": \"34aeb4da20f93ac80a6291a2dbe7b9c6460e9b26\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"622c36f143fc9566ba49d7cec994c2da1182d9e2\", \"lessThan\": \"9892742f035f7aa7dcd2bb0750effa486db89576\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"622c36f143fc9566ba49d7cec994c2da1182d9e2\", \"lessThan\": \"4d3fcfe8464838b3920bc2b939d888e0b792934e\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"622c36f143fc9566ba49d7cec994c2da1182d9e2\", \"lessThan\": \"db6fd92316a254be2097556f01bccecf560e53ce\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"622c36f143fc9566ba49d7cec994c2da1182d9e2\", \"lessThan\": \"e8f73f620fee5f52653ed2da360121e4446575c5\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"622c36f143fc9566ba49d7cec994c2da1182d9e2\", \"lessThan\": \"5aac9108a180fc06e28d4e7fb00247ce603b72ee\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"ae43f9360a21b35cf785ae9a0fdce524d7af0938\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"ae9d577f3dbb686862b7d0dc9cc73054f0964d4d\", \"versionType\": \"git\"}], \"programFiles\": [\"drivers/net/ethernet/amd/xgbe/xgbe-drv.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"4.11\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"4.11\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"4.9.300\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"4.9.*\"}, {\"status\": \"unaffected\", \"version\": \"4.14.265\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"4.14.*\"}, {\"status\": \"unaffected\", \"version\": \"4.19.228\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"4.19.*\"}, {\"status\": \"unaffected\", \"version\": \"5.4.177\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.4.*\"}, {\"status\": \"unaffected\", \"version\": \"5.10.97\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.10.*\"}, {\"status\": \"unaffected\", \"version\": \"5.15.20\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.15.*\"}, {\"status\": \"unaffected\", \"version\": \"5.16.6\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.16.*\"}, {\"status\": \"unaffected\", \"version\": \"5.17\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"drivers/net/ethernet/amd/xgbe/xgbe-drv.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/9924c80bd484340191e586110ca22bff23a49f2e\"}, {\"url\": \"https://git.kernel.org/stable/c/617f9934bb37993b9813832516f318ba874bcb7d\"}, {\"url\": \"https://git.kernel.org/stable/c/34aeb4da20f93ac80a6291a2dbe7b9c6460e9b26\"}, {\"url\": \"https://git.kernel.org/stable/c/9892742f035f7aa7dcd2bb0750effa486db89576\"}, {\"url\": \"https://git.kernel.org/stable/c/4d3fcfe8464838b3920bc2b939d888e0b792934e\"}, {\"url\": \"https://git.kernel.org/stable/c/db6fd92316a254be2097556f01bccecf560e53ce\"}, {\"url\": \"https://git.kernel.org/stable/c/e8f73f620fee5f52653ed2da360121e4446575c5\"}, {\"url\": \"https://git.kernel.org/stable/c/5aac9108a180fc06e28d4e7fb00247ce603b72ee\"}], \"x_generator\": {\"engine\": \"bippy-1.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nnet: amd-xgbe: Fix skb data length underflow\\n\\nThere will be BUG_ON() triggered in include/linux/skbuff.h leading to\\nintermittent kernel panic, when the skb length underflow is detected.\\n\\nFix this by dropping the packet if such length underflows are seen\\nbecause of inconsistencies in the hardware descriptors.\"}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"4.9.300\", \"versionStartIncluding\": \"4.9.19\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"4.14.265\", \"versionStartIncluding\": \"4.11\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"4.19.228\", \"versionStartIncluding\": \"4.11\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.4.177\", \"versionStartIncluding\": \"4.11\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.10.97\", \"versionStartIncluding\": \"4.11\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.15.20\", \"versionStartIncluding\": \"4.11\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.16.6\", \"versionStartIncluding\": \"4.11\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.17\", \"versionStartIncluding\": \"4.11\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionStartIncluding\": \"4.4.58\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionStartIncluding\": \"4.10.7\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2025-05-04T12:43:38.834Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2022-48743\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-05-04T12:43:38.834Z\", \"dateReserved\": \"2024-06-20T11:09:39.054Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-06-20T11:13:27.312Z\", \"assignerShortName\": \"Linux\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}