First published: Mon Oct 21 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: e100: Fix possible use after free in e100_xmit_prepare In e100_xmit_prepare(), if we can't map the skb, then return -ENOMEM, so e100_xmit_frame() will return NETDEV_TX_BUSY and the upper layer will resend the skb. But the skb is already freed, which will cause UAF bug when the upper layer resends the skb. Remove the harmful free.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=4.3<5.10.158 | |
Linux Kernel | >=5.11<5.15.82 | |
Linux Kernel | >=5.16<6.0.12 | |
Linux Kernel | =6.1-rc1 | |
Linux Kernel | =6.1-rc2 | |
Linux Kernel | =6.1-rc3 | |
Linux Kernel | =6.1-rc4 | |
Linux Kernel | =6.1-rc5 | |
Linux Kernel | =6.1-rc6 | |
Linux Kernel | =6.1-rc7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-49026 is categorized as a medium severity vulnerability in the Linux kernel.
To fix CVE-2022-49026, ensure that your Linux kernel is updated to a version that includes the patch for this vulnerability.
CVE-2022-49026 affects multiple versions of the Linux kernel, including versions from 4.3 to 6.0.12 and certain release candidate versions.
The vulnerability in CVE-2022-49026 is a use after free issue that occurs within the e100 networking driver.
Exploitation of CVE-2022-49026 could lead to instability or a denial of service in affected systems running the vulnerable versions of the Linux kernel.