In the Linux kernel, the following vulnerability has been resolved:
e100: Fix possible use after free in e100_xmit_prepare
In e100_xmit_prepare(), if we can't map the skb, then return -ENOMEM, so
e100_xmit_frame() will return NETDEV_TX_BUSY and the upper layer will
resend the skb. But the skb is already freed, which will cause UAF bug
when the upper layer resends the skb.
Remove the harmful free.
References
Configurations
Configuration 1 (hide)
|
History
24 Oct 2024, 03:49
Type | Values Removed | Values Added |
---|---|---|
First Time |
Linux linux Kernel
Linux |
|
CPE | cpe:2.3:o:linux:linux_kernel:6.1:rc7:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.1:rc6:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
CWE | CWE-416 | |
References | () https://git.kernel.org/stable/c/45605c75c52c7ae7bfe902214343aabcfe5ba0ff - Patch | |
References | () https://git.kernel.org/stable/c/9fc27d22cdb9b1fcd754599d216a8992fed280cd - Patch | |
References | () https://git.kernel.org/stable/c/b46f6144ab89d3d757ead940759c505091626a7d - Patch | |
References | () https://git.kernel.org/stable/c/b775f37d943966f6f77dca402f5a9dedce502c25 - Patch |
23 Oct 2024, 15:12
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
21 Oct 2024, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-10-21 20:15
Updated : 2024-10-24 03:49
NVD link : CVE-2022-49026
Mitre link : CVE-2022-49026
CVE.ORG link : CVE-2022-49026
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free