First published: Mon Oct 21 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Fix use-after-free when reverting termination table When having multiple dests with termination tables and second one or afterwards fails the driver reverts usage of term tables but doesn't reset the assignment in attr->dests[num_vport_dests].termtbl which case a use-after-free when releasing the rule. Fix by resetting the assignment of termtbl to null.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=5.3<5.4.226 | |
Linux Kernel | >=5.5<5.10.158 | |
Linux Kernel | >=5.11<5.15.82 | |
Linux Kernel | >=5.16<6.0.12 | |
Linux Kernel | =6.1-rc1 | |
Linux Kernel | =6.1-rc2 | |
Linux Kernel | =6.1-rc3 | |
Linux Kernel | =6.1-rc4 | |
Linux Kernel | =6.1-rc5 | |
Linux Kernel | =6.1-rc6 | |
Linux Kernel | =6.1-rc7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-49025 has a severity rating that warrants immediate attention due to potential exploitation risks.
To fix CVE-2022-49025, update your Linux kernel to a vulnerable version that addresses the use-after-free issue.
CVE-2022-49025 affects multiple versions of the Linux kernel between 5.3 and 6.1-rc7.
CVE-2022-49025 could impact any system running an affected version of the Linux kernel, particularly those using the mlx5e driver.
Additional details on CVE-2022-49025 can be found in the official Linux kernel git repository.