CVE-2022-48647

Severity CVSS v4.0:
Pending analysis
Type:
CWE-476 NULL Pointer Dereference
Publication date:
28/04/2024
Last modified:
03/03/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> sfc: fix TX channel offset when using legacy interrupts<br /> <br /> In legacy interrupt mode the tx_channel_offset was hardcoded to 1, but<br /> that&amp;#39;s not correct if efx_sepparate_tx_channels is false. In that case,<br /> the offset is 0 because the tx queues are in the single existing channel<br /> at index 0, together with the rx queue.<br /> <br /> Without this fix, as soon as you try to send any traffic, it tries to<br /> get the tx queues from an uninitialized channel getting these errors:<br /> WARNING: CPU: 1 PID: 0 at drivers/net/ethernet/sfc/tx.c:540 efx_hard_start_xmit+0x12e/0x170 [sfc]<br /> [...]<br /> RIP: 0010:efx_hard_start_xmit+0x12e/0x170 [sfc]<br /> [...]<br /> Call Trace:<br /> <br /> dev_hard_start_xmit+0xd7/0x230<br /> sch_direct_xmit+0x9f/0x360<br /> __dev_queue_xmit+0x890/0xa40<br /> [...]<br /> BUG: unable to handle kernel NULL pointer dereference at 0000000000000020<br /> [...]<br /> RIP: 0010:efx_hard_start_xmit+0x153/0x170 [sfc]<br /> [...]<br /> Call Trace:<br /> <br /> dev_hard_start_xmit+0xd7/0x230<br /> sch_direct_xmit+0x9f/0x360<br /> __dev_queue_xmit+0x890/0xa40<br /> [...]

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.10.122 (including) 5.10.146 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.15.47 (including) 5.15.71 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.17.15 (including) 5.18 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.18.4 (including) 5.19.12 (excluding)
cpe:2.3:o:linux:linux_kernel:6.0:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.0:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.0:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.0:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.0:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.0:rc6:*:*:*:*:*:*