CVE-2022-48794

MEDIUM

Linux Kernel < 4.9.303 - Memory Leak

Title source: rule

Description

In the Linux kernel, the following vulnerability has been resolved: net: ieee802154: at86rf230: Stop leaking skb's Upon error the ieee802154_xmit_complete() helper is not called. Only ieee802154_wake_queue() is called manually. In the Tx case we then leak the skb structure. Free the skb structure upon error before returning when appropriate. As the 'is_tx = 0' cannot be moved in the complete handler because of a possible race between the delay in switching to STATE_RX_AACK_ON and a new interrupt, we introduce an intermediate 'was_tx' boolean just for this purpose. There is no Fixes tag applying here, many changes have been made on this area and the issue kind of always existed.

Scores

CVSS v3 5.5
EPSS 0.0002
EPSS Percentile 5.9%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Classification

CWE
CWE-401
Status published

Affected Products (10)

linux/linux_kernel < 4.9.303
linux/linux_kernel
linux/linux_kernel
linux/Kernel < 4.9.303linux
linux/Kernel < 4.14.268linux
linux/Kernel < 4.19.231linux
linux/Kernel < 5.4.181linux
linux/Kernel < 5.10.102linux
linux/Kernel < 5.15.25linux
linux/Kernel < 5.16.11linux

Timeline

Published Jul 16, 2024
Tracked Since Feb 18, 2026