Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-48645— net: enetc: deny offload of tc-based TSN features on VF interfaces

EPSS 0.01% · P3
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2022-48645

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
net: enetc: deny offload of tc-based TSN features on VF interfaces
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: net: enetc: deny offload of tc-based TSN features on VF interfaces TSN features on the ENETC (taprio, cbs, gate, police) are configured through a mix of command BD ring messages and port registers: enetc_port_rd(), enetc_port_wr(). Port registers are a region of the ENETC memory map which are only accessible from the PCIe Physical Function. They are not accessible from the Virtual Functions. Moreover, attempting to access these registers crashes the kernel: $ echo 1 > /sys/bus/pci/devices/0000\:00\:00.0/sriov_numvfs pci 0000:00:01.0: [1957:ef00] type 00 class 0x020001 fsl_enetc_vf 0000:00:01.0: Adding to iommu group 15 fsl_enetc_vf 0000:00:01.0: enabling device (0000 -> 0002) fsl_enetc_vf 0000:00:01.0 eno0vf0: renamed from eth0 $ tc qdisc replace dev eno0vf0 root taprio num_tc 8 map 0 1 2 3 4 5 6 7 \ queues 1@0 1@1 1@2 1@3 1@4 1@5 1@6 1@7 base-time 0 \ sched-entry S 0x7f 900000 sched-entry S 0x80 100000 flags 0x2 Unable to handle kernel paging request at virtual address ffff800009551a08 Internal error: Oops: 96000007 [#1] PREEMPT SMP pc : enetc_setup_tc_taprio+0x170/0x47c lr : enetc_setup_tc_taprio+0x16c/0x47c Call trace: enetc_setup_tc_taprio+0x170/0x47c enetc_setup_tc+0x38/0x2dc taprio_change+0x43c/0x970 taprio_init+0x188/0x1e0 qdisc_create+0x114/0x470 tc_modify_qdisc+0x1fc/0x6c0 rtnetlink_rcv_msg+0x12c/0x390 Split enetc_setup_tc() into separate functions for the PF and for the VF drivers. Also remove enetc_qos.o from being included into enetc-vf.ko, since it serves absolutely no purpose there.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于在 VF 接口上卸载基于 tc 的 TSN 功能。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux 34c6adf1977b611fca3b824ad12a2a415e1e420e ~ 510e703e4ed0e011db860bc21228aff48fc9eea7 -
LinuxLinux 5.5 -

II. Public POCs for CVE-2022-48645

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2022-48645

登录查看更多情报信息。

Same Patch Batch · Linux · 2024-04-28 · 40 CVEs total

CVE-2022-48638cgroup: cgroup_get_from_id() must check the looked-up kn is a directory
CVE-2022-48648sfc: fix null pointer dereference in efx_hard_start_xmit
CVE-2022-48647sfc: fix TX channel offset when using legacy interrupts
CVE-2022-48646sfc/siena: fix null pointer dereference in efx_hard_start_xmit
CVE-2022-48644net/sched: taprio: avoid disabling offload when it was never enabled
CVE-2022-48643netfilter: nf_tables: fix nft_counters_enabled underflow at nf_tables_addchain()
CVE-2022-48642netfilter: nf_tables: fix percpu memory leak at nf_tables_addchain()
CVE-2022-48641netfilter: ebtables: fix memory leak when blob is malformed
CVE-2022-48640bonding: fix NULL deref in bond_rr_gen_slave_id
CVE-2022-48639net: sched: fix possible refcount leak in tc_new_tfilter()
CVE-2022-48649mm/slab_common: fix possible double free of kmem_cache
CVE-2022-48637bnxt: prevent skb UAF after handing over to PTP worker
CVE-2022-48636s390/dasd: fix Oops in dasd_alias_get_start_dev due to missing pavgroup
CVE-2022-48635fsdax: Fix infinite loop in dax_iomap_rw()
CVE-2022-48634drm/gma500: Fix BUG: sleeping function called from invalid context errors
CVE-2022-48633drm/gma500: Fix WARN_ON(lock->magic != lock) error
CVE-2022-48632i2c: mlxbf: prevent stack overflow in mlxbf_i2c_smbus_start_transaction()
CVE-2022-48631ext4: fix bug in extents parsing when eh_entries == 0 and eh_depth > 0
CVE-2024-26928smb: client: fix potential UAF in cifs_debug_files_proc_show()
CVE-2024-26927ASoC: SOF: Add some bounds checking to firmware data

Showing top 20 of 40 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2022-48645

No comments yet


Leave a comment