In the Linux kernel, the following vulnerability has been resolved:
net: sched: Fix use after free in red_enqueue()
We can't use "skb" again after passing it to qdisc_enqueue(). This is
basically identical to commit 2f09707d0c97 ("sch_sfb: Also store skb
len before calling child enqueue").
References
Configurations
Configuration 1 (hide)
|
History
07 May 2025, 13:27
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
CWE | CWE-416 | |
References | () https://git.kernel.org/stable/c/170e5317042c302777ed6d59fdb84af9b0219d4e - Patch | |
References | () https://git.kernel.org/stable/c/52e0429471976785c155bfbf51d80990c6cd46e2 - Patch | |
References | () https://git.kernel.org/stable/c/5960b9081baca85cc7dcb14aec1de85999ea9d36 - Patch | |
References | () https://git.kernel.org/stable/c/795afe0b9bb6c915f0299a8e309936519be01619 - Patch | |
References | () https://git.kernel.org/stable/c/8bdc2acd420c6f3dd1f1c78750ec989f02a1e2b9 - Patch | |
References | () https://git.kernel.org/stable/c/a238cdcf2bdc72207c74375fc8be13ee549ca9db - Patch | |
References | () https://git.kernel.org/stable/c/e877f8fa49fbccc63cb2df2e9179bddc695b825a - Patch | |
References | () https://git.kernel.org/stable/c/fc4b50adb400ee5ec527a04073174e8e73a139fa - Patch | |
First Time |
Linux linux Kernel
Linux |
02 May 2025, 13:52
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
01 May 2025, 15:16
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-01 15:16
Updated : 2025-05-07 13:27
NVD link : CVE-2022-49921
Mitre link : CVE-2022-49921
CVE.ORG link : CVE-2022-49921
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free