CVE-2022-49026

In the Linux kernel, the following vulnerability has been resolved: e100: Fix possible use after free in e100_xmit_prepare In e100_xmit_prepare(), if we can't map the skb, then return -ENOMEM, so e100_xmit_frame() will return NETDEV_TX_BUSY and the upper layer will resend the skb. But the skb is already freed, which will cause UAF bug when the upper layer resends the skb. Remove the harmful free.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc7:*:*:*:*:*:*

History

24 Oct 2024, 03:49

Type Values Removed Values Added
First Time Linux linux Kernel
Linux
CPE cpe:2.3:o:linux:linux_kernel:6.1:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CWE CWE-416
References () https://git.kernel.org/stable/c/45605c75c52c7ae7bfe902214343aabcfe5ba0ff - () https://git.kernel.org/stable/c/45605c75c52c7ae7bfe902214343aabcfe5ba0ff - Patch
References () https://git.kernel.org/stable/c/9fc27d22cdb9b1fcd754599d216a8992fed280cd - () https://git.kernel.org/stable/c/9fc27d22cdb9b1fcd754599d216a8992fed280cd - Patch
References () https://git.kernel.org/stable/c/b46f6144ab89d3d757ead940759c505091626a7d - () https://git.kernel.org/stable/c/b46f6144ab89d3d757ead940759c505091626a7d - Patch
References () https://git.kernel.org/stable/c/b775f37d943966f6f77dca402f5a9dedce502c25 - () https://git.kernel.org/stable/c/b775f37d943966f6f77dca402f5a9dedce502c25 - Patch

23 Oct 2024, 15:12

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: e100: Se corrige el posible use after free en e100_xmit_prepare En e100_xmit_prepare(), si no podemos mapear el skb, entonces devolvemos -ENOMEM, por lo que e100_xmit_frame() devolverá NETDEV_TX_BUSY y la capa superior reenviará el skb. Pero el skb ya está liberado, lo que provocará un error UAF cuando la capa superior reenvíe el skb. Elimine la liberación dañina.

21 Oct 2024, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-21 20:15

Updated : 2024-10-24 03:49


NVD link : CVE-2022-49026

Mitre link : CVE-2022-49026

CVE.ORG link : CVE-2022-49026


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free