CVE-2022-49921

In the Linux kernel, the following vulnerability has been resolved: net: sched: Fix use after free in red_enqueue() We can't use "skb" again after passing it to qdisc_enqueue(). This is basically identical to commit 2f09707d0c97 ("sch_sfb: Also store skb len before calling child enqueue").
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*

History

07 May 2025, 13:27

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CWE CWE-416
References () https://git.kernel.org/stable/c/170e5317042c302777ed6d59fdb84af9b0219d4e - () https://git.kernel.org/stable/c/170e5317042c302777ed6d59fdb84af9b0219d4e - Patch
References () https://git.kernel.org/stable/c/52e0429471976785c155bfbf51d80990c6cd46e2 - () https://git.kernel.org/stable/c/52e0429471976785c155bfbf51d80990c6cd46e2 - Patch
References () https://git.kernel.org/stable/c/5960b9081baca85cc7dcb14aec1de85999ea9d36 - () https://git.kernel.org/stable/c/5960b9081baca85cc7dcb14aec1de85999ea9d36 - Patch
References () https://git.kernel.org/stable/c/795afe0b9bb6c915f0299a8e309936519be01619 - () https://git.kernel.org/stable/c/795afe0b9bb6c915f0299a8e309936519be01619 - Patch
References () https://git.kernel.org/stable/c/8bdc2acd420c6f3dd1f1c78750ec989f02a1e2b9 - () https://git.kernel.org/stable/c/8bdc2acd420c6f3dd1f1c78750ec989f02a1e2b9 - Patch
References () https://git.kernel.org/stable/c/a238cdcf2bdc72207c74375fc8be13ee549ca9db - () https://git.kernel.org/stable/c/a238cdcf2bdc72207c74375fc8be13ee549ca9db - Patch
References () https://git.kernel.org/stable/c/e877f8fa49fbccc63cb2df2e9179bddc695b825a - () https://git.kernel.org/stable/c/e877f8fa49fbccc63cb2df2e9179bddc695b825a - Patch
References () https://git.kernel.org/stable/c/fc4b50adb400ee5ec527a04073174e8e73a139fa - () https://git.kernel.org/stable/c/fc4b50adb400ee5ec527a04073174e8e73a139fa - Patch
First Time Linux linux Kernel
Linux

02 May 2025, 13:52

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: sched: Se corrige el use after free en red_enqueue(). No podemos volver a usar "skb" después de pasarlo a qdisc_enqueue(). Esto es prácticamente idéntico a el commit 2f09707d0c97 ("sch_sfb: También se almacena la longitud de skb antes de llamar a la cola secundaria").

01 May 2025, 15:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-01 15:16

Updated : 2025-05-07 13:27


NVD link : CVE-2022-49921

Mitre link : CVE-2022-49921

CVE.ORG link : CVE-2022-49921


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free