
Cloud Vulnerability DB
A community-led vulnerabilities database
In the Linux kernel, a vulnerability (CVE-2022-49642) was discovered in the Synopsys DWC Ethernet driver for Tegra194. The issue occurs when the split header feature is enabled in the stmmac driver, where a larger than expected buffer length can be received causing the calculation of the total buffer length to overflow (Kernel Commit).
The vulnerability manifests when the split header feature is enabled in the stmmac driver. When a larger than expected buffer length is received, it causes the calculation of the total buffer length to overflow. This overflow results in a very large buffer length that ultimately causes the kernel to crash. The issue was traced back to the split header feature, which according to NVIDIA's design team, is not supported for Tegra194 (Kernel Commit).
When successfully exploited, this vulnerability can lead to random system crashes on affected Tegra194 systems using the Synopsys DWC Ethernet driver (Kernel Commit).
The vulnerability was fixed by disabling split header support for Tegra194 through setting data->sph_disable = 1 in the driver. This prevents the random crashes from occurring by avoiding the use of an unsupported feature (Kernel Commit).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."