{"id":"CVE-2022-49858","summary":"octeontx2-pf: Fix SQE threshold checking","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nocteontx2-pf: Fix SQE threshold checking\n\nCurrent way of checking available SQE count which is based on\nHW updated SQB count could result in driver submitting an SQE\neven before CQE for the previously transmitted SQE at the same\nindex is processed in NAPI resulting losing SKB pointers,\nhence a leak. Fix this by checking a consumer index which\nis updated once CQE is processed.","modified":"2026-04-03T13:14:45.351979140Z","published":"2025-05-01T14:10:11.559Z","related":["SUSE-SU-2025:01918-1","SUSE-SU-2025:01966-1","SUSE-SU-2025:02173-1","SUSE-SU-2025:02262-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49858.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/015e3c0a3b16193aab23beefe4719484b9984c2d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f0dfc4c88ef39be0ba736aa0ce6119263fc19aeb"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49858.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49858"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"3ca6c4c882a7f34085b170d93cf0d0e843aa00e6"},{"fixed":"015e3c0a3b16193aab23beefe4719484b9984c2d"},{"fixed":"f0dfc4c88ef39be0ba736aa0ce6119263fc19aeb"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49858.json"}}],"schema_version":"1.7.5"}