{"id":"CVE-2022-48743","summary":"net: amd-xgbe: Fix skb data length underflow","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet: amd-xgbe: Fix skb data length underflow\n\nThere will be BUG_ON() triggered in include/linux/skbuff.h leading to\nintermittent kernel panic, when the skb length underflow is detected.\n\nFix this by dropping the packet if such length underflows are seen\nbecause of inconsistencies in the hardware descriptors.","modified":"2026-04-02T08:26:57.176328Z","published":"2024-06-20T11:13:27.312Z","related":["ALSA-2024:4928","ALSA-2024:5101","SUSE-SU-2024:2360-1","SUSE-SU-2024:2372-1","SUSE-SU-2024:2381-1","SUSE-SU-2024:2394-1","SUSE-SU-2024:2561-1","SUSE-SU-2024:2902-1","SUSE-SU-2024:2929-1","SUSE-SU-2024:2939-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/48xxx/CVE-2022-48743.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/34aeb4da20f93ac80a6291a2dbe7b9c6460e9b26"},{"type":"WEB","url":"https://git.kernel.org/stable/c/4d3fcfe8464838b3920bc2b939d888e0b792934e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/5aac9108a180fc06e28d4e7fb00247ce603b72ee"},{"type":"WEB","url":"https://git.kernel.org/stable/c/617f9934bb37993b9813832516f318ba874bcb7d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/9892742f035f7aa7dcd2bb0750effa486db89576"},{"type":"WEB","url":"https://git.kernel.org/stable/c/9924c80bd484340191e586110ca22bff23a49f2e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/db6fd92316a254be2097556f01bccecf560e53ce"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e8f73f620fee5f52653ed2da360121e4446575c5"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/48xxx/CVE-2022-48743.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-48743"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"fafc9555d87a19c78bcd43ed731c3a73bf0b37a9"},{"fixed":"9924c80bd484340191e586110ca22bff23a49f2e"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"622c36f143fc9566ba49d7cec994c2da1182d9e2"},{"fixed":"617f9934bb37993b9813832516f318ba874bcb7d"},{"fixed":"34aeb4da20f93ac80a6291a2dbe7b9c6460e9b26"},{"fixed":"9892742f035f7aa7dcd2bb0750effa486db89576"},{"fixed":"4d3fcfe8464838b3920bc2b939d888e0b792934e"},{"fixed":"db6fd92316a254be2097556f01bccecf560e53ce"},{"fixed":"e8f73f620fee5f52653ed2da360121e4446575c5"},{"fixed":"5aac9108a180fc06e28d4e7fb00247ce603b72ee"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"0"},{"last_affected":"ae43f9360a21b35cf785ae9a0fdce524d7af0938"},{"last_affected":"ae9d577f3dbb686862b7d0dc9cc73054f0964d4d"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-48743.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"}]}