CVE-2022-49809

In the Linux kernel, the following vulnerability has been resolved: net/x25: Fix skb leak in x25_lapb_receive_frame() x25_lapb_receive_frame() using skb_copy() to get a private copy of skb, the new skb should be freed in the undersized/fragmented skb error handling path. Otherwise there is a memory leak.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.1:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*

History

07 Nov 2025, 19:37

Type Values Removed Values Added
CWE CWE-401
First Time Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.1:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/0ef17d966445358a55c5f4ccf2c73cca3e39192b - () https://git.kernel.org/stable/c/0ef17d966445358a55c5f4ccf2c73cca3e39192b - Patch
References () https://git.kernel.org/stable/c/2929cceb2fcf0ded7182562e4888afafece82cce - () https://git.kernel.org/stable/c/2929cceb2fcf0ded7182562e4888afafece82cce - Patch
References () https://git.kernel.org/stable/c/2d675be16a461310d738d93f9f1a00da62055c5a - () https://git.kernel.org/stable/c/2d675be16a461310d738d93f9f1a00da62055c5a - Patch
References () https://git.kernel.org/stable/c/9f00da9c866d506998bf0a3f699ec900730472da - () https://git.kernel.org/stable/c/9f00da9c866d506998bf0a3f699ec900730472da - Patch
References () https://git.kernel.org/stable/c/c8baf1fc248b2e88642f094fea9509a9bf98c5bb - () https://git.kernel.org/stable/c/c8baf1fc248b2e88642f094fea9509a9bf98c5bb - Patch
References () https://git.kernel.org/stable/c/dfcfbe4f2e4b2c81cff4e79b48502d97fda73118 - () https://git.kernel.org/stable/c/dfcfbe4f2e4b2c81cff4e79b48502d97fda73118 - Patch
References () https://git.kernel.org/stable/c/e109b41870db995cae25dfaf0cc3922f9028b1a1 - () https://git.kernel.org/stable/c/e109b41870db995cae25dfaf0cc3922f9028b1a1 - Patch
References () https://git.kernel.org/stable/c/fda0ba7c84b46d10947c687320804b9de149a921 - () https://git.kernel.org/stable/c/fda0ba7c84b46d10947c687320804b9de149a921 - Patch

02 May 2025, 13:53

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net/x25: Se corrige la fuga de skb en x25_lapb_receive_frame(). x25_lapb_receive_frame() usa skb_copy() para obtener una copia privada de skb. El nuevo skb debe liberarse en la ruta de gestión de errores de skb de tamaño insuficiente/fragmentado. De lo contrario, se produce una fuga de memoria.

01 May 2025, 15:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-01 15:16

Updated : 2025-11-07 19:37


NVD link : CVE-2022-49809

Mitre link : CVE-2022-49809

CVE.ORG link : CVE-2022-49809


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-401

Missing Release of Memory after Effective Lifetime