{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2022-49695","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2025-02-26T02:21:30.442Z","datePublished":"2025-02-26T02:24:17.545Z","dateUpdated":"2025-05-04T08:43:26.888Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2025-05-04T08:43:26.888Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nigb: fix a use-after-free issue in igb_clean_tx_ring\n\nFix the following use-after-free bug in igb_clean_tx_ring routine when\nthe NIC is running in XDP mode. The issue can be triggered redirecting\ntraffic into the igb NIC and then closing the device while the traffic\nis flowing.\n\n[   73.322719] CPU: 1 PID: 487 Comm: xdp_redirect Not tainted 5.18.3-apu2 #9\n[   73.330639] Hardware name: PC Engines APU2/APU2, BIOS 4.0.7 02/28/2017\n[   73.337434] RIP: 0010:refcount_warn_saturate+0xa7/0xf0\n[   73.362283] RSP: 0018:ffffc9000081f798 EFLAGS: 00010282\n[   73.367761] RAX: 0000000000000000 RBX: ffffc90000420f80 RCX: 0000000000000000\n[   73.375200] RDX: ffff88811ad22d00 RSI: ffff88811ad171e0 RDI: ffff88811ad171e0\n[   73.382590] RBP: 0000000000000900 R08: ffffffff82298f28 R09: 0000000000000058\n[   73.390008] R10: 0000000000000219 R11: ffffffff82280f40 R12: 0000000000000090\n[   73.397356] R13: ffff888102343a40 R14: ffff88810359e0e4 R15: 0000000000000000\n[   73.404806] FS:  00007ff38d31d740(0000) GS:ffff88811ad00000(0000) knlGS:0000000000000000\n[   73.413129] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[   73.419096] CR2: 000055cff35f13f8 CR3: 0000000106391000 CR4: 00000000000406e0\n[   73.426565] Call Trace:\n[   73.429087]  <TASK>\n[   73.431314]  igb_clean_tx_ring+0x43/0x140 [igb]\n[   73.436002]  igb_down+0x1d7/0x220 [igb]\n[   73.439974]  __igb_close+0x3c/0x120 [igb]\n[   73.444118]  igb_xdp+0x10c/0x150 [igb]\n[   73.447983]  ? igb_pci_sriov_configure+0x70/0x70 [igb]\n[   73.453362]  dev_xdp_install+0xda/0x110\n[   73.457371]  dev_xdp_attach+0x1da/0x550\n[   73.461369]  do_setlink+0xfd0/0x10f0\n[   73.465166]  ? __nla_validate_parse+0x89/0xc70\n[   73.469714]  rtnl_setlink+0x11a/0x1e0\n[   73.473547]  rtnetlink_rcv_msg+0x145/0x3d0\n[   73.477709]  ? rtnl_calcit.isra.0+0x130/0x130\n[   73.482258]  netlink_rcv_skb+0x8d/0x110\n[   73.486229]  netlink_unicast+0x230/0x340\n[   73.490317]  netlink_sendmsg+0x215/0x470\n[   73.494395]  __sys_sendto+0x179/0x190\n[   73.498268]  ? move_addr_to_user+0x37/0x70\n[   73.502547]  ? __sys_getsockname+0x84/0xe0\n[   73.506853]  ? netlink_setsockopt+0x1c1/0x4a0\n[   73.511349]  ? __sys_setsockopt+0xc8/0x1d0\n[   73.515636]  __x64_sys_sendto+0x20/0x30\n[   73.519603]  do_syscall_64+0x3b/0x80\n[   73.523399]  entry_SYSCALL_64_after_hwframe+0x44/0xae\n[   73.528712] RIP: 0033:0x7ff38d41f20c\n[   73.551866] RSP: 002b:00007fff3b945a68 EFLAGS: 00000246 ORIG_RAX: 000000000000002c\n[   73.559640] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff38d41f20c\n[   73.567066] RDX: 0000000000000034 RSI: 00007fff3b945b30 RDI: 0000000000000003\n[   73.574457] RBP: 0000000000000003 R08: 0000000000000000 R09: 0000000000000000\n[   73.581852] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fff3b945ab0\n[   73.589179] R13: 0000000000000000 R14: 0000000000000003 R15: 00007fff3b945b30\n[   73.596545]  </TASK>\n[   73.598842] ---[ end trace 0000000000000000 ]---"}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/net/ethernet/intel/igb/igb_main.c"],"versions":[{"version":"9cbc948b5a20c9c054d9631099c0426c16da546b","lessThan":"c12a2c9b1b460ed72e6b3c33aac1ef51b0329b66","status":"affected","versionType":"git"},{"version":"9cbc948b5a20c9c054d9631099c0426c16da546b","lessThan":"2af944210dc23d43d8208dafac4df7be7e3c168b","status":"affected","versionType":"git"},{"version":"9cbc948b5a20c9c054d9631099c0426c16da546b","lessThan":"68a0ed06dcd5d3ea732d011c0b83d66e4791f521","status":"affected","versionType":"git"},{"version":"9cbc948b5a20c9c054d9631099c0426c16da546b","lessThan":"3f6a57ee8544ec3982f8a3cbcbf4aea7d47eb9ec","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/net/ethernet/intel/igb/igb_main.c"],"versions":[{"version":"5.10","status":"affected"},{"version":"0","lessThan":"5.10","status":"unaffected","versionType":"semver"},{"version":"5.10.127","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.51","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"5.18.8","lessThanOrEqual":"5.18.*","status":"unaffected","versionType":"semver"},{"version":"5.19","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.10","versionEndExcluding":"5.10.127"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.10","versionEndExcluding":"5.15.51"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.10","versionEndExcluding":"5.18.8"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.10","versionEndExcluding":"5.19"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/c12a2c9b1b460ed72e6b3c33aac1ef51b0329b66"},{"url":"https://git.kernel.org/stable/c/2af944210dc23d43d8208dafac4df7be7e3c168b"},{"url":"https://git.kernel.org/stable/c/68a0ed06dcd5d3ea732d011c0b83d66e4791f521"},{"url":"https://git.kernel.org/stable/c/3f6a57ee8544ec3982f8a3cbcbf4aea7d47eb9ec"}],"title":"igb: fix a use-after-free issue in igb_clean_tx_ring","x_generator":{"engine":"bippy-1.2.0"}},"adp":[{"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":7.8,"attackVector":"LOCAL","baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","integrityImpact":"HIGH","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"LOW","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"id":"CVE-2022-49695","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"version":"2.0.3","timestamp":"2025-02-27T18:15:05.537306Z"}}}],"problemTypes":[{"descriptions":[{"lang":"en","type":"CWE","cweId":"CWE-416","description":"CWE-416 Use After Free"}]}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-02-27T18:22:30.994Z"}}]}}