CVE-2022-49026

Source
https://cve.org/CVERecord?id=CVE-2022-49026
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49026.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49026
Downstream
Related
Published
2024-10-21T20:06:31.876Z
Modified
2026-03-20T12:22:06.802007Z
Summary
e100: Fix possible use after free in e100_xmit_prepare
Details

In the Linux kernel, the following vulnerability has been resolved:

e100: Fix possible use after free in e100xmitprepare

In e100xmitprepare(), if we can't map the skb, then return -ENOMEM, so e100xmitframe() will return NETDEVTXBUSY and the upper layer will resend the skb. But the skb is already freed, which will cause UAF bug when the upper layer resends the skb.

Remove the harmful free.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49026.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
5e5d49422dfb035ca9e280cd61d434095c151272
Fixed
b775f37d943966f6f77dca402f5a9dedce502c25
Fixed
9fc27d22cdb9b1fcd754599d216a8992fed280cd
Fixed
b46f6144ab89d3d757ead940759c505091626a7d
Fixed
45605c75c52c7ae7bfe902214343aabcfe5ba0ff

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49026.json"