CVE-2022-49026

In the Linux kernel, the following vulnerability has been resolved: e100: Fix possible use after free in e100_xmit_prepare In e100_xmit_prepare(), if we can't map the skb, then return -ENOMEM, so e100_xmit_frame() will return NETDEV_TX_BUSY and the upper layer will resend the skb. But the skb is already freed, which will cause UAF bug when the upper layer resends the skb. Remove the harmful free.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

24 Oct 2024, 03:49

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/b775f37d943966f6f77dca402f5a9dedce502c25 - () https://git.kernel.org/stable/c/b775f37d943966f6f77dca402f5a9dedce502c25 - Patch
References () https://git.kernel.org/stable/c/9fc27d22cdb9b1fcd754599d216a8992fed280cd - () https://git.kernel.org/stable/c/9fc27d22cdb9b1fcd754599d216a8992fed280cd - Patch
References () https://git.kernel.org/stable/c/45605c75c52c7ae7bfe902214343aabcfe5ba0ff - () https://git.kernel.org/stable/c/45605c75c52c7ae7bfe902214343aabcfe5ba0ff - Patch
References () https://git.kernel.org/stable/c/b46f6144ab89d3d757ead940759c505091626a7d - () https://git.kernel.org/stable/c/b46f6144ab89d3d757ead940759c505091626a7d - Patch
CPE cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux
Linux linux Kernel
CWE CWE-416
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8

21 Oct 2024, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-21 20:15

Updated : 2024-10-24 03:49


NVD link : CVE-2022-49026

Mitre link : CVE-2022-49026


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free