CVE-2022-49695

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-49695
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-49695.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-49695
Downstream
Related
Published
2025-02-26T02:24:17Z
Modified
2025-10-21T11:01:37.897380Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
igb: fix a use-after-free issue in igb_clean_tx_ring
Details

In the Linux kernel, the following vulnerability has been resolved:

igb: fix a use-after-free issue in igbcleantx_ring

Fix the following use-after-free bug in igbcleantx_ring routine when the NIC is running in XDP mode. The issue can be triggered redirecting traffic into the igb NIC and then closing the device while the traffic is flowing.

[ 73.322719] CPU: 1 PID: 487 Comm: xdpredirect Not tainted 5.18.3-apu2 #9 [ 73.330639] Hardware name: PC Engines APU2/APU2, BIOS 4.0.7 02/28/2017 [ 73.337434] RIP: 0010:refcountwarnsaturate+0xa7/0xf0 [ 73.362283] RSP: 0018:ffffc9000081f798 EFLAGS: 00010282 [ 73.367761] RAX: 0000000000000000 RBX: ffffc90000420f80 RCX: 0000000000000000 [ 73.375200] RDX: ffff88811ad22d00 RSI: ffff88811ad171e0 RDI: ffff88811ad171e0 [ 73.382590] RBP: 0000000000000900 R08: ffffffff82298f28 R09: 0000000000000058 [ 73.390008] R10: 0000000000000219 R11: ffffffff82280f40 R12: 0000000000000090 [ 73.397356] R13: ffff888102343a40 R14: ffff88810359e0e4 R15: 0000000000000000 [ 73.404806] FS: 00007ff38d31d740(0000) GS:ffff88811ad00000(0000) knlGS:0000000000000000 [ 73.413129] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 73.419096] CR2: 000055cff35f13f8 CR3: 0000000106391000 CR4: 00000000000406e0 [ 73.426565] Call Trace: [ 73.429087] <TASK> [ 73.431314] igbcleantxring+0x43/0x140 [igb] [ 73.436002] igbdown+0x1d7/0x220 [igb] [ 73.439974] _igbclose+0x3c/0x120 [igb] [ 73.444118] igbxdp+0x10c/0x150 [igb] [ 73.447983] ? igbpcisriovconfigure+0x70/0x70 [igb] [ 73.453362] devxdpinstall+0xda/0x110 [ 73.457371] devxdpattach+0x1da/0x550 [ 73.461369] dosetlink+0xfd0/0x10f0 [ 73.465166] ? _nlavalidateparse+0x89/0xc70 [ 73.469714] rtnlsetlink+0x11a/0x1e0 [ 73.473547] rtnetlinkrcvmsg+0x145/0x3d0 [ 73.477709] ? rtnlcalcit.isra.0+0x130/0x130 [ 73.482258] netlinkrcvskb+0x8d/0x110 [ 73.486229] netlinkunicast+0x230/0x340 [ 73.490317] netlinksendmsg+0x215/0x470 [ 73.494395] _syssendto+0x179/0x190 [ 73.498268] ? moveaddrtouser+0x37/0x70 [ 73.502547] ? _sysgetsockname+0x84/0xe0 [ 73.506853] ? netlinksetsockopt+0x1c1/0x4a0 [ 73.511349] ? _syssetsockopt+0xc8/0x1d0 [ 73.515636] _x64syssendto+0x20/0x30 [ 73.519603] dosyscall64+0x3b/0x80 [ 73.523399] entrySYSCALL64afterhwframe+0x44/0xae [ 73.528712] RIP: 0033:0x7ff38d41f20c [ 73.551866] RSP: 002b:00007fff3b945a68 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 73.559640] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff38d41f20c [ 73.567066] RDX: 0000000000000034 RSI: 00007fff3b945b30 RDI: 0000000000000003 [ 73.574457] RBP: 0000000000000003 R08: 0000000000000000 R09: 0000000000000000 [ 73.581852] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fff3b945ab0 [ 73.589179] R13: 0000000000000000 R14: 0000000000000003 R15: 00007fff3b945b30 [ 73.596545] </TASK> [ 73.598842] ---[ end trace 0000000000000000 ]---

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
9cbc948b5a20c9c054d9631099c0426c16da546b
Fixed
c12a2c9b1b460ed72e6b3c33aac1ef51b0329b66
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
9cbc948b5a20c9c054d9631099c0426c16da546b
Fixed
2af944210dc23d43d8208dafac4df7be7e3c168b
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
9cbc948b5a20c9c054d9631099c0426c16da546b
Fixed
68a0ed06dcd5d3ea732d011c0b83d66e4791f521
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
9cbc948b5a20c9c054d9631099c0426c16da546b
Fixed
3f6a57ee8544ec3982f8a3cbcbf4aea7d47eb9ec

Affected versions

v5.*

v5.10
v5.10-rc1
v5.10-rc2
v5.10-rc3
v5.10-rc4
v5.10-rc5
v5.10-rc6
v5.10-rc7
v5.10.1
v5.10.10
v5.10.100
v5.10.101
v5.10.102
v5.10.103
v5.10.104
v5.10.105
v5.10.106
v5.10.107
v5.10.108
v5.10.109
v5.10.11
v5.10.110
v5.10.111
v5.10.112
v5.10.113
v5.10.114
v5.10.115
v5.10.116
v5.10.117
v5.10.118
v5.10.119
v5.10.12
v5.10.120
v5.10.121
v5.10.122
v5.10.123
v5.10.124
v5.10.125
v5.10.126
v5.10.13
v5.10.14
v5.10.15
v5.10.16
v5.10.17
v5.10.18
v5.10.19
v5.10.2
v5.10.20
v5.10.21
v5.10.22
v5.10.23
v5.10.24
v5.10.25
v5.10.26
v5.10.27
v5.10.28
v5.10.29
v5.10.3
v5.10.30
v5.10.31
v5.10.32
v5.10.33
v5.10.34
v5.10.35
v5.10.36
v5.10.37
v5.10.38
v5.10.39
v5.10.4
v5.10.40
v5.10.41
v5.10.42
v5.10.43
v5.10.44
v5.10.45
v5.10.46
v5.10.47
v5.10.48
v5.10.49
v5.10.5
v5.10.50
v5.10.51
v5.10.52
v5.10.53
v5.10.54
v5.10.55
v5.10.56
v5.10.57
v5.10.58
v5.10.59
v5.10.6
v5.10.60
v5.10.61
v5.10.62
v5.10.63
v5.10.64
v5.10.65
v5.10.66
v5.10.67
v5.10.68
v5.10.69
v5.10.7
v5.10.70
v5.10.71
v5.10.72
v5.10.73
v5.10.74
v5.10.75
v5.10.76
v5.10.77
v5.10.78
v5.10.79
v5.10.8
v5.10.80
v5.10.81
v5.10.82
v5.10.83
v5.10.84
v5.10.85
v5.10.86
v5.10.87
v5.10.88
v5.10.89
v5.10.9
v5.10.90
v5.10.91
v5.10.92
v5.10.93
v5.10.94
v5.10.95
v5.10.96
v5.10.97
v5.10.98
v5.10.99
v5.11
v5.11-rc1
v5.11-rc2
v5.11-rc3
v5.11-rc4
v5.11-rc5
v5.11-rc6
v5.11-rc7
v5.12
v5.12-rc1
v5.12-rc1-dontuse
v5.12-rc2
v5.12-rc3
v5.12-rc4
v5.12-rc5
v5.12-rc6
v5.12-rc7
v5.12-rc8
v5.13
v5.13-rc1
v5.13-rc2
v5.13-rc3
v5.13-rc4
v5.13-rc5
v5.13-rc6
v5.13-rc7
v5.14
v5.14-rc1
v5.14-rc2
v5.14-rc3
v5.14-rc4
v5.14-rc5
v5.14-rc6
v5.14-rc7
v5.15
v5.15-rc1
v5.15-rc2
v5.15-rc3
v5.15-rc4
v5.15-rc5
v5.15-rc6
v5.15-rc7
v5.15.1
v5.15.10
v5.15.11
v5.15.12
v5.15.13
v5.15.14
v5.15.15
v5.15.16
v5.15.17
v5.15.18
v5.15.19
v5.15.2
v5.15.20
v5.15.21
v5.15.22
v5.15.23
v5.15.24
v5.15.25
v5.15.26
v5.15.27
v5.15.28
v5.15.29
v5.15.3
v5.15.30
v5.15.31
v5.15.32
v5.15.33
v5.15.34
v5.15.35
v5.15.36
v5.15.37
v5.15.38
v5.15.39
v5.15.4
v5.15.40
v5.15.41
v5.15.42
v5.15.43
v5.15.44
v5.15.45
v5.15.46
v5.15.47
v5.15.48
v5.15.49
v5.15.5
v5.15.50
v5.15.6
v5.15.7
v5.15.8
v5.15.9
v5.16
v5.16-rc1
v5.16-rc2
v5.16-rc3
v5.16-rc4
v5.16-rc5
v5.16-rc6
v5.16-rc7
v5.16-rc8
v5.17
v5.17-rc1
v5.17-rc2
v5.17-rc3
v5.17-rc4
v5.17-rc5
v5.17-rc6
v5.17-rc7
v5.17-rc8
v5.18
v5.18-rc1
v5.18-rc2
v5.18-rc3
v5.18-rc4
v5.18-rc5
v5.18-rc6
v5.18-rc7
v5.18.1
v5.18.2
v5.18.3
v5.18.4
v5.18.5
v5.18.6
v5.18.7
v5.19-rc1
v5.19-rc2
v5.9
v5.9-rc7
v5.9-rc8

Database specific

vanir_signatures

[
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@68a0ed06dcd5d3ea732d011c0b83d66e4791f521",
        "signature_version": "v1",
        "deprecated": false,
        "target": {
            "function": "igb_clean_tx_ring",
            "file": "drivers/net/ethernet/intel/igb/igb_main.c"
        },
        "id": "CVE-2022-49695-253a5945",
        "signature_type": "Function",
        "digest": {
            "length": 897.0,
            "function_hash": "337163868136116716117283475011825934426"
        }
    },
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2af944210dc23d43d8208dafac4df7be7e3c168b",
        "signature_version": "v1",
        "deprecated": false,
        "target": {
            "function": "igb_clean_tx_ring",
            "file": "drivers/net/ethernet/intel/igb/igb_main.c"
        },
        "id": "CVE-2022-49695-4d65b357",
        "signature_type": "Function",
        "digest": {
            "length": 897.0,
            "function_hash": "337163868136116716117283475011825934426"
        }
    },
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@68a0ed06dcd5d3ea732d011c0b83d66e4791f521",
        "signature_version": "v1",
        "deprecated": false,
        "target": {
            "file": "drivers/net/ethernet/intel/igb/igb_main.c"
        },
        "id": "CVE-2022-49695-89c080ee",
        "signature_type": "Line",
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "141798210831037451059522429445769090494",
                "229405139588141835626313024559534284792",
                "91324440024069233436146800283566034629",
                "168496264926498335240983621855464019184"
            ]
        }
    },
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c12a2c9b1b460ed72e6b3c33aac1ef51b0329b66",
        "signature_version": "v1",
        "deprecated": false,
        "target": {
            "file": "drivers/net/ethernet/intel/igb/igb_main.c"
        },
        "id": "CVE-2022-49695-8ecd8aa8",
        "signature_type": "Line",
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "141798210831037451059522429445769090494",
                "229405139588141835626313024559534284792",
                "91324440024069233436146800283566034629",
                "168496264926498335240983621855464019184"
            ]
        }
    },
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3f6a57ee8544ec3982f8a3cbcbf4aea7d47eb9ec",
        "signature_version": "v1",
        "deprecated": false,
        "target": {
            "file": "drivers/net/ethernet/intel/igb/igb_main.c"
        },
        "id": "CVE-2022-49695-9294c704",
        "signature_type": "Line",
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "141798210831037451059522429445769090494",
                "229405139588141835626313024559534284792",
                "91324440024069233436146800283566034629",
                "168496264926498335240983621855464019184"
            ]
        }
    },
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c12a2c9b1b460ed72e6b3c33aac1ef51b0329b66",
        "signature_version": "v1",
        "deprecated": false,
        "target": {
            "function": "igb_clean_tx_ring",
            "file": "drivers/net/ethernet/intel/igb/igb_main.c"
        },
        "id": "CVE-2022-49695-99ed6fb5",
        "signature_type": "Function",
        "digest": {
            "length": 897.0,
            "function_hash": "337163868136116716117283475011825934426"
        }
    },
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3f6a57ee8544ec3982f8a3cbcbf4aea7d47eb9ec",
        "signature_version": "v1",
        "deprecated": false,
        "target": {
            "function": "igb_clean_tx_ring",
            "file": "drivers/net/ethernet/intel/igb/igb_main.c"
        },
        "id": "CVE-2022-49695-a36529f6",
        "signature_type": "Function",
        "digest": {
            "length": 897.0,
            "function_hash": "337163868136116716117283475011825934426"
        }
    },
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2af944210dc23d43d8208dafac4df7be7e3c168b",
        "signature_version": "v1",
        "deprecated": false,
        "target": {
            "file": "drivers/net/ethernet/intel/igb/igb_main.c"
        },
        "id": "CVE-2022-49695-abf0ba10",
        "signature_type": "Line",
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "141798210831037451059522429445769090494",
                "229405139588141835626313024559534284792",
                "91324440024069233436146800283566034629",
                "168496264926498335240983621855464019184"
            ]
        }
    }
]

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.10.0
Fixed
5.10.127
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.51
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
5.18.8