CVE-2022-49695

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-49695
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49695.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49695
Related
Published
2025-02-26T07:01:44Z
Modified
2025-03-24T20:51:00.858536Z
Downstream
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved:

igb: fix a use-after-free issue in igbcleantx_ring

Fix the following use-after-free bug in igbcleantx_ring routine when the NIC is running in XDP mode. The issue can be triggered redirecting traffic into the igb NIC and then closing the device while the traffic is flowing.

[ 73.322719] CPU: 1 PID: 487 Comm: xdpredirect Not tainted 5.18.3-apu2 #9 [ 73.330639] Hardware name: PC Engines APU2/APU2, BIOS 4.0.7 02/28/2017 [ 73.337434] RIP: 0010:refcountwarnsaturate+0xa7/0xf0 [ 73.362283] RSP: 0018:ffffc9000081f798 EFLAGS: 00010282 [ 73.367761] RAX: 0000000000000000 RBX: ffffc90000420f80 RCX: 0000000000000000 [ 73.375200] RDX: ffff88811ad22d00 RSI: ffff88811ad171e0 RDI: ffff88811ad171e0 [ 73.382590] RBP: 0000000000000900 R08: ffffffff82298f28 R09: 0000000000000058 [ 73.390008] R10: 0000000000000219 R11: ffffffff82280f40 R12: 0000000000000090 [ 73.397356] R13: ffff888102343a40 R14: ffff88810359e0e4 R15: 0000000000000000 [ 73.404806] FS: 00007ff38d31d740(0000) GS:ffff88811ad00000(0000) knlGS:0000000000000000 [ 73.413129] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 73.419096] CR2: 000055cff35f13f8 CR3: 0000000106391000 CR4: 00000000000406e0 [ 73.426565] Call Trace: [ 73.429087] <TASK> [ 73.431314] igbcleantxring+0x43/0x140 [igb] [ 73.436002] igbdown+0x1d7/0x220 [igb] [ 73.439974] _igbclose+0x3c/0x120 [igb] [ 73.444118] igbxdp+0x10c/0x150 [igb] [ 73.447983] ? igbpcisriovconfigure+0x70/0x70 [igb] [ 73.453362] devxdpinstall+0xda/0x110 [ 73.457371] devxdpattach+0x1da/0x550 [ 73.461369] dosetlink+0xfd0/0x10f0 [ 73.465166] ? _nlavalidateparse+0x89/0xc70 [ 73.469714] rtnlsetlink+0x11a/0x1e0 [ 73.473547] rtnetlinkrcvmsg+0x145/0x3d0 [ 73.477709] ? rtnlcalcit.isra.0+0x130/0x130 [ 73.482258] netlinkrcvskb+0x8d/0x110 [ 73.486229] netlinkunicast+0x230/0x340 [ 73.490317] netlinksendmsg+0x215/0x470 [ 73.494395] _syssendto+0x179/0x190 [ 73.498268] ? moveaddrtouser+0x37/0x70 [ 73.502547] ? _sysgetsockname+0x84/0xe0 [ 73.506853] ? netlinksetsockopt+0x1c1/0x4a0 [ 73.511349] ? _syssetsockopt+0xc8/0x1d0 [ 73.515636] _x64syssendto+0x20/0x30 [ 73.519603] dosyscall64+0x3b/0x80 [ 73.523399] entrySYSCALL64afterhwframe+0x44/0xae [ 73.528712] RIP: 0033:0x7ff38d41f20c [ 73.551866] RSP: 002b:00007fff3b945a68 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 73.559640] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff38d41f20c [ 73.567066] RDX: 0000000000000034 RSI: 00007fff3b945b30 RDI: 0000000000000003 [ 73.574457] RBP: 0000000000000003 R08: 0000000000000000 R09: 0000000000000000 [ 73.581852] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fff3b945ab0 [ 73.589179] R13: 0000000000000000 R14: 0000000000000003 R15: 00007fff3b945b30 [ 73.596545] </TASK> [ 73.598842] ---[ end trace 0000000000000000 ]---

References

Affected packages

Debian:11 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.10.127-1

Affected versions

5.*

5.10.46-4
5.10.46-5
5.10.70-1~bpo10+1
5.10.70-1
5.10.84-1
5.10.92-1~bpo10+1
5.10.92-1
5.10.92-2
5.10.103-1~bpo10+1
5.10.103-1
5.10.106-1
5.10.113-1
5.10.120-1~bpo10+1
5.10.120-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.18.14-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.18.14-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}