CVE-2022-49026
e100: Fix possible use after free in e100_xmit_prepare
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: e100: Fix possible use after free in e100_xmit_prepare In e100_xmit_prepare(), if we can't map the skb, then return -ENOMEM, so e100_xmit_frame() will return NETDEV_TX_BUSY and the upper layer will resend the skb. But the skb is already freed, which will cause UAF bug when the upper layer resends the skb. Remove the harmful free.
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | Oct 21, 2024 |
| Last Updated | May 11, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new unknown vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
5e5d49422dfb035ca9e280cd61d434095c151272 < b775f37d943966f6f77dca402f5a9dedce502c25 5e5d49422dfb035ca9e280cd61d434095c151272 < 9fc27d22cdb9b1fcd754599d216a8992fed280cd 5e5d49422dfb035ca9e280cd61d434095c151272 < b46f6144ab89d3d757ead940759c505091626a7d 5e5d49422dfb035ca9e280cd61d434095c151272 < 45605c75c52c7ae7bfe902214343aabcfe5ba0ff
Linux / Linux
4.3
References
git.kernel.org: https://git.kernel.org/stable/c/b775f37d943966f6f77dca402f5a9dedce502c25 git.kernel.org: https://git.kernel.org/stable/c/9fc27d22cdb9b1fcd754599d216a8992fed280cd git.kernel.org: https://git.kernel.org/stable/c/b46f6144ab89d3d757ead940759c505091626a7d git.kernel.org: https://git.kernel.org/stable/c/45605c75c52c7ae7bfe902214343aabcfe5ba0ff