Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2022-49093 | First vendor Publication | 2025-02-26 |
Vendor | Cve | Last vendor Modification | 2025-03-25 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : | |||
---|---|---|---|
Cvss Base Score | N/A | Attack Range | N/A |
Cvss Impact Score | N/A | Attack Complexity | N/A |
Cvss Expoit Score | N/A | Authentication | N/A |
Calculate full CVSS 2.0 Vectors scores |
Detail
In the Linux kernel, the following vulnerability has been resolved: skbuff: fix coalescing for page_pool fragment recycling Fix a use-after-free when using page_pool with page fragments. We encountered this problem during normal RX in the hns3 driver: (1) Initially we have three descriptors in the RX queue. The first one RX_BD1 _______ PAGE1 (2) Handle RX on the first descriptor. Allocate SKB1, eventually added (3) Handle RX on the second descriptor. Allocate SKB2 and pass it to netif_receive_skb(SKB2) SKB2 and SKB3 share a reference to PAGE2 through SKB2 ---+- PAGE2 (3b) Now while handling TCP, coalesce SKB3 with SKB1: tcp_v4_rcv(SKB3) SKB1 _____ PAGE1 In skb_try_coalesce(), __skb_frag_ref() takes a page reference to (3c) Drop SKB2: af_packet_rcv(SKB2) SKB1 _____ PAGE1 (4) Userspace calls recvmsg() tcp_eat_recv_skb(SKB1) (5) PAGE2 is freed, but the third RX descriptor was still using it! Change the logic that checks whether pp_recycle SKBs can be coalesced. We still reject differing pp_recycle between 'from' and 'to' SKBs, but in order to avoid the situation described above, we also reject coalescing when both 'from' and 'to' are pp_recycled and 'from' is cloned. The new logic allows coalescing a cloned pp_recycle SKB into a page refcounted one, because in this case the release (4) will drop the right reference, the one taken by skb_try_coalesce(). |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49093 |
CPE : Common Platform Enumeration
Sources (Detail)
Alert History
Date | Informations |
---|---|
2025-06-26 02:09:12 |
|
2025-06-25 12:22:03 |
|
2025-06-24 02:13:49 |
|
2025-05-27 02:09:23 |
|
2025-03-28 17:21:04 |
|
2025-03-28 13:34:36 |
|
2025-03-28 02:56:42 |
|
2025-03-25 21:20:59 |
|
2025-02-28 00:20:34 |
|
2025-02-26 17:20:34 |
|