In the Linux kernel, the following vulnerability has been resolved:
e100: Fix possible use after free in e100xmitprepare
In e100xmitprepare(), if we can't map the skb, then return -ENOMEM, so e100xmitframe() will return NETDEVTXBUSY and the upper layer will resend the skb. But the skb is already freed, which will cause UAF bug when the upper layer resends the skb.
Remove the harmful free.
{ "vanir_signatures": [ { "target": { "file": "drivers/net/ethernet/intel/e100.c" }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@45605c75c52c7ae7bfe902214343aabcfe5ba0ff", "digest": { "threshold": 0.9, "line_hashes": [ "71196887489968451553619266900205714881", "54998492545246966145991146415710886625", "133163774036544208863952779313016125829", "313616887061235213930440432593140001491", "59401863096310459178663099311421529332", "260695713778149210873502707335919077024", "1565987428400012950419410994632749872", "94137724981774159439838430537264955610" ] }, "deprecated": false, "id": "CVE-2022-49026-1e260797", "signature_type": "Line", "signature_version": "v1" }, { "target": { "file": "drivers/net/ethernet/intel/e100.c" }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b46f6144ab89d3d757ead940759c505091626a7d", "digest": { "threshold": 0.9, "line_hashes": [ "71196887489968451553619266900205714881", "54998492545246966145991146415710886625", "133163774036544208863952779313016125829", "313616887061235213930440432593140001491", "59401863096310459178663099311421529332", "260695713778149210873502707335919077024", "1565987428400012950419410994632749872", "94137724981774159439838430537264955610" ] }, "deprecated": false, "id": "CVE-2022-49026-21c14662", "signature_type": "Line", "signature_version": "v1" }, { "target": { "function": "e100_xmit_prepare", "file": "drivers/net/ethernet/intel/e100.c" }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@45605c75c52c7ae7bfe902214343aabcfe5ba0ff", "digest": { "length": 913.0, "function_hash": "86947301213404396855614433410856334184" }, "deprecated": false, "id": "CVE-2022-49026-599fc251", "signature_type": "Function", "signature_version": "v1" }, { "target": { "function": "e100_xmit_prepare", "file": "drivers/net/ethernet/intel/e100.c" }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9fc27d22cdb9b1fcd754599d216a8992fed280cd", "digest": { "length": 913.0, "function_hash": "86947301213404396855614433410856334184" }, "deprecated": false, "id": "CVE-2022-49026-7170a774", "signature_type": "Function", "signature_version": "v1" }, { "target": { "file": "drivers/net/ethernet/intel/e100.c" }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b775f37d943966f6f77dca402f5a9dedce502c25", "digest": { "threshold": 0.9, "line_hashes": [ "71196887489968451553619266900205714881", "54998492545246966145991146415710886625", "133163774036544208863952779313016125829", "313616887061235213930440432593140001491", "59401863096310459178663099311421529332", "260695713778149210873502707335919077024", "1565987428400012950419410994632749872", "94137724981774159439838430537264955610" ] }, "deprecated": false, "id": "CVE-2022-49026-7c874a5e", "signature_type": "Line", "signature_version": "v1" }, { "target": { "function": "e100_xmit_prepare", "file": "drivers/net/ethernet/intel/e100.c" }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b775f37d943966f6f77dca402f5a9dedce502c25", "digest": { "length": 913.0, "function_hash": "86947301213404396855614433410856334184" }, "deprecated": false, "id": "CVE-2022-49026-a94d6f92", "signature_type": "Function", "signature_version": "v1" }, { "target": { "file": "drivers/net/ethernet/intel/e100.c" }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9fc27d22cdb9b1fcd754599d216a8992fed280cd", "digest": { "threshold": 0.9, "line_hashes": [ "71196887489968451553619266900205714881", "54998492545246966145991146415710886625", "133163774036544208863952779313016125829", "313616887061235213930440432593140001491", "59401863096310459178663099311421529332", "260695713778149210873502707335919077024", "1565987428400012950419410994632749872", "94137724981774159439838430537264955610" ] }, "deprecated": false, "id": "CVE-2022-49026-e4ecc229", "signature_type": "Line", "signature_version": "v1" }, { "target": { "function": "e100_xmit_prepare", "file": "drivers/net/ethernet/intel/e100.c" }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b46f6144ab89d3d757ead940759c505091626a7d", "digest": { "length": 913.0, "function_hash": "86947301213404396855614433410856334184" }, "deprecated": false, "id": "CVE-2022-49026-f117eef5", "signature_type": "Function", "signature_version": "v1" } ] }