A flaw was found in the Linux kernel’s networking code. A use-after-free was found in the way the sch_sfb enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed) into a child qdisc. This flaw allows a local, unprivileged user to crash the system, causing a denial of service.
[
{
"events": [
{
"introduced": "2.6.39"
},
{
"last_affected": "5.19"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "6.0-rc1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "6.0-rc2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "6.0-rc3"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "6.0-rc4"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "10.0"
}
]
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-3586.json"