In the Linux kernel, the following vulnerability has been resolved:
igb: Do not free q_vector unless new one was allocated
Avoid potential use-after-free condition under memory pressure. If the
kzalloc() fails, q_vector will be freed but left in the original
adapter->q_vector[v_idx] array position.
References
Configurations
Configuration 1 (hide)
|
History
26 Nov 2025, 16:25
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-416 | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
| First Time |
Linux linux Kernel
Linux |
|
| References | () https://git.kernel.org/stable/c/0200f0fbb11e359cc35af72ab10b2ec224e6f633 - Patch | |
| References | () https://git.kernel.org/stable/c/0668716506ca66f90d395f36ccdaebc3e0e84801 - Patch | |
| References | () https://git.kernel.org/stable/c/314f7092b27749bdde44c14095b5533afa2a3bc8 - Patch | |
| References | () https://git.kernel.org/stable/c/3cb18dea11196fb4a06f78294cec5e61985e1aff - Patch | |
| References | () https://git.kernel.org/stable/c/56483aecf6b22eb7dff6315b3a174688c6ad494c - Patch | |
| References | () https://git.kernel.org/stable/c/64ca1969599857143e91aeec4440640656100803 - Patch | |
| References | () https://git.kernel.org/stable/c/68e8adbcaf7a8743e473343b38b9dad66e2ac6f3 - Patch | |
| References | () https://git.kernel.org/stable/c/6e399577bd397a517df4b938601108c63769ce0a - Patch | |
| References | () https://git.kernel.org/stable/c/f96bd8adc8adde25390965a8c1ee81b73cb62075 - Patch |
Information
Published : 2025-09-15 14:15
Updated : 2025-11-26 16:25
NVD link : CVE-2022-50252
Mitre link : CVE-2022-50252
CVE.ORG link : CVE-2022-50252
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free
