CVE-2022-49958
BaseFortify
Publication date: 2025-06-18
Last updated on: 2025-11-14
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.0 |
| linux | linux_kernel | 6.0 |
| linux | linux_kernel | 6.0 |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-Other |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's network scheduling code, specifically in the function attach_default_qdiscs(). When a network device has multiple queues and the first queue (queue 0) fails to attach a queuing discipline (qdisc) due to lack of memory, the device's qdisc defaults to noop_qdisc. However, other queues might still successfully attach their default qdiscs. This situation triggers a fallback to a noqueue process without properly releasing the originally attached qdisc, causing netdevice reference leaks. Essentially, the kernel fails to clean up references correctly, leading to resource leaks.
How can this vulnerability impact me? :
The impact of this vulnerability is that it causes netdevice reference leaks in the Linux kernel. This can lead to increased resource consumption and potentially prevent network devices from being properly freed or unregistered, which may degrade system stability or cause network-related issues over time.