In the Linux kernel, the following vulnerability has been resolved:
e100: Fix possible use after free in e100xmitprepare
In e100xmitprepare(), if we can't map the skb, then return -ENOMEM, so e100xmitframe() will return NETDEVTXBUSY and the upper layer will resend the skb. But the skb is already freed, which will cause UAF bug when the upper layer resends the skb.
Remove the harmful free.
[
{
"signature_version": "v1",
"deprecated": false,
"digest": {
"line_hashes": [
"71196887489968451553619266900205714881",
"54998492545246966145991146415710886625",
"133163774036544208863952779313016125829",
"313616887061235213930440432593140001491",
"59401863096310459178663099311421529332",
"260695713778149210873502707335919077024",
"1565987428400012950419410994632749872",
"94137724981774159439838430537264955610"
],
"threshold": 0.9
},
"id": "CVE-2022-49026-1e260797",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@45605c75c52c7ae7bfe902214343aabcfe5ba0ff",
"signature_type": "Line",
"target": {
"file": "drivers/net/ethernet/intel/e100.c"
}
},
{
"signature_version": "v1",
"deprecated": false,
"digest": {
"line_hashes": [
"71196887489968451553619266900205714881",
"54998492545246966145991146415710886625",
"133163774036544208863952779313016125829",
"313616887061235213930440432593140001491",
"59401863096310459178663099311421529332",
"260695713778149210873502707335919077024",
"1565987428400012950419410994632749872",
"94137724981774159439838430537264955610"
],
"threshold": 0.9
},
"id": "CVE-2022-49026-21c14662",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b46f6144ab89d3d757ead940759c505091626a7d",
"signature_type": "Line",
"target": {
"file": "drivers/net/ethernet/intel/e100.c"
}
},
{
"signature_version": "v1",
"deprecated": false,
"digest": {
"function_hash": "86947301213404396855614433410856334184",
"length": 913.0
},
"id": "CVE-2022-49026-599fc251",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@45605c75c52c7ae7bfe902214343aabcfe5ba0ff",
"signature_type": "Function",
"target": {
"function": "e100_xmit_prepare",
"file": "drivers/net/ethernet/intel/e100.c"
}
},
{
"signature_version": "v1",
"deprecated": false,
"digest": {
"function_hash": "86947301213404396855614433410856334184",
"length": 913.0
},
"id": "CVE-2022-49026-7170a774",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9fc27d22cdb9b1fcd754599d216a8992fed280cd",
"signature_type": "Function",
"target": {
"function": "e100_xmit_prepare",
"file": "drivers/net/ethernet/intel/e100.c"
}
},
{
"signature_version": "v1",
"deprecated": false,
"digest": {
"line_hashes": [
"71196887489968451553619266900205714881",
"54998492545246966145991146415710886625",
"133163774036544208863952779313016125829",
"313616887061235213930440432593140001491",
"59401863096310459178663099311421529332",
"260695713778149210873502707335919077024",
"1565987428400012950419410994632749872",
"94137724981774159439838430537264955610"
],
"threshold": 0.9
},
"id": "CVE-2022-49026-7c874a5e",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b775f37d943966f6f77dca402f5a9dedce502c25",
"signature_type": "Line",
"target": {
"file": "drivers/net/ethernet/intel/e100.c"
}
},
{
"signature_version": "v1",
"deprecated": false,
"digest": {
"function_hash": "86947301213404396855614433410856334184",
"length": 913.0
},
"id": "CVE-2022-49026-a94d6f92",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b775f37d943966f6f77dca402f5a9dedce502c25",
"signature_type": "Function",
"target": {
"function": "e100_xmit_prepare",
"file": "drivers/net/ethernet/intel/e100.c"
}
},
{
"signature_version": "v1",
"deprecated": false,
"digest": {
"line_hashes": [
"71196887489968451553619266900205714881",
"54998492545246966145991146415710886625",
"133163774036544208863952779313016125829",
"313616887061235213930440432593140001491",
"59401863096310459178663099311421529332",
"260695713778149210873502707335919077024",
"1565987428400012950419410994632749872",
"94137724981774159439838430537264955610"
],
"threshold": 0.9
},
"id": "CVE-2022-49026-e4ecc229",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9fc27d22cdb9b1fcd754599d216a8992fed280cd",
"signature_type": "Line",
"target": {
"file": "drivers/net/ethernet/intel/e100.c"
}
},
{
"signature_version": "v1",
"deprecated": false,
"digest": {
"function_hash": "86947301213404396855614433410856334184",
"length": 913.0
},
"id": "CVE-2022-49026-f117eef5",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b46f6144ab89d3d757ead940759c505091626a7d",
"signature_type": "Function",
"target": {
"function": "e100_xmit_prepare",
"file": "drivers/net/ethernet/intel/e100.c"
}
}
]