In the Linux kernel, the following vulnerability has been resolved:
net: sched: Fix use after free in red_enqueue()
We can't use "skb" again after passing it to qdisc_enqueue(). This is
basically identical to commit 2f09707d0c97 ("sch_sfb: Also store skb
len before calling child enqueue").
References
Configurations
Configuration 1 (hide)
|
History
07 May 2025, 13:27
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-01 15:16
Updated : 2025-05-07 13:27
NVD link : CVE-2022-49921
Mitre link : CVE-2022-49921
CVE.ORG link : CVE-2022-49921
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free