![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
CVE ID: | CVE-2022-48647 |
Description: | In the Linux kernel, the following vulnerability has been resolved:
sfc: fix TX channel offset when using legacy interrupts In legacy
interrupt mode the tx_channel_offset was hardcoded to 1, but that's
not correct if efx_sepparate_tx_channels is false. In that case, the
offset is 0 because the tx queues are in the single existing channel
at index 0, together with the rx queue. Without this fix, as soon as
you try to send any traffic, it tries to get the tx queues from an
uninitialized channel getting these errors: WARNING: CPU: 1 PID: 0 at
drivers/net/ethernet/sfc/tx.c:540 efx_hard_start_xmit+0x12e/0x170
[sfc] [...] RIP: 0010:efx_hard_start_xmit+0x12e/0x170 [sfc] [...] Call
Trace: |
Test IDs: | None available |
Cross References: |
Common Vulnerability Exposure (CVE) ID: CVE-2022-48647 https://git.kernel.org/stable/c/360910b88d1466a90644a4e0533803b594344a2b https://git.kernel.org/stable/c/360910b88d1466a90644a4e0533803b594344a2b https://git.kernel.org/stable/c/5f623a77cfc2d501d72bcb4f9ee71721e6c766ff https://git.kernel.org/stable/c/5f623a77cfc2d501d72bcb4f9ee71721e6c766ff https://git.kernel.org/stable/c/b4afd3878f961d3517f27b3213730fceef77945c https://git.kernel.org/stable/c/b4afd3878f961d3517f27b3213730fceef77945c https://git.kernel.org/stable/c/f232af4295653afa4ade3230462b3be15ad16419 https://git.kernel.org/stable/c/f232af4295653afa4ade3230462b3be15ad16419 |