CVE-2022-48647

Source
https://cve.org/CVERecord?id=CVE-2022-48647
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-48647.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-48647
Downstream
Related
Published
2024-04-28T13:00:19.674Z
Modified
2026-03-14T12:00:39.777203Z
Summary
sfc: fix TX channel offset when using legacy interrupts
Details

In the Linux kernel, the following vulnerability has been resolved:

sfc: fix TX channel offset when using legacy interrupts

In legacy interrupt mode the txchanneloffset was hardcoded to 1, but that's not correct if efxsepparatetx_channels is false. In that case, the offset is 0 because the tx queues are in the single existing channel at index 0, together with the rx queue.

Without this fix, as soon as you try to send any traffic, it tries to get the tx queues from an uninitialized channel getting these errors: WARNING: CPU: 1 PID: 0 at drivers/net/ethernet/sfc/tx.c:540 efxhardstartxmit+0x12e/0x170 [sfc] [...] RIP: 0010:efxhardstartxmit+0x12e/0x170 [sfc] [...] Call Trace: <IRQ> devhardstartxmit+0xd7/0x230 schdirect_xmit+0x9f/0x360 __devqueuexmit+0x890/0xa40 [...] BUG: unable to handle kernel NULL pointer dereference at 0000000000000020 [...] RIP: 0010:efxhardstartxmit+0x153/0x170 [sfc] [...] Call Trace: <IRQ> devhardstartxmit+0xd7/0x230 schdirectxmit+0x9f/0x360 __devqueuexmit+0x890/0xa40 [...]

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/48xxx/CVE-2022-48647.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
bf2af9b24313553f3f0b30443220ab0ac8595d2d
Fixed
b4afd3878f961d3517f27b3213730fceef77945c
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
06cb7e134f8f4a11b66f1dbeb5f237412a0aeedc
Fixed
360910b88d1466a90644a4e0533803b594344a2b
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
c308dfd1b43ef0d4c3e57b741bb3462eb7a7f4a2
Fixed
5f623a77cfc2d501d72bcb4f9ee71721e6c766ff
Fixed
f232af4295653afa4ade3230462b3be15ad16419
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
1a7c0b3ef93d1d1dae7b0a85dab3ac6e3ad0ef61
Last affected
b2d60329a0b88c4e35017436ee29c43be59d46a5

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-48647.json"