CVE-2022-48794

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
16/07/2024
Last modified:
24/09/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> net: ieee802154: at86rf230: Stop leaking skb&amp;#39;s<br /> <br /> Upon error the ieee802154_xmit_complete() helper is not called. Only<br /> ieee802154_wake_queue() is called manually. In the Tx case we then leak<br /> the skb structure.<br /> <br /> Free the skb structure upon error before returning when appropriate.<br /> <br /> As the &amp;#39;is_tx = 0&amp;#39; cannot be moved in the complete handler because of a<br /> possible race between the delay in switching to STATE_RX_AACK_ON and a<br /> new interrupt, we introduce an intermediate &amp;#39;was_tx&amp;#39; boolean just for<br /> this purpose.<br /> <br /> There is no Fixes tag applying here, many changes have been made on this<br /> area and the issue kind of always existed.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.9.303 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.10 (including) 4.14.268 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.15 (including) 4.19.231 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.20 (including) 5.4.181 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.5 (including) 5.10.102 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.25 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 5.16.11 (excluding)
cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.17:rc2:*:*:*:*:*:*