CVE-2022-48794
MEDIUMLinux Kernel < 4.9.303 - Memory Leak
Title source: ruleDescription
In the Linux kernel, the following vulnerability has been resolved: net: ieee802154: at86rf230: Stop leaking skb's Upon error the ieee802154_xmit_complete() helper is not called. Only ieee802154_wake_queue() is called manually. In the Tx case we then leak the skb structure. Free the skb structure upon error before returning when appropriate. As the 'is_tx = 0' cannot be moved in the complete handler because of a possible race between the delay in switching to STATE_RX_AACK_ON and a new interrupt, we introduce an intermediate 'was_tx' boolean just for this purpose. There is no Fixes tag applying here, many changes have been made on this area and the issue kind of always existed.
References (8)
Scores
CVSS v3
5.5
EPSS
0.0002
EPSS Percentile
5.9%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Classification
CWE
CWE-401
Status
published
Affected Products (10)
linux/linux_kernel
< 4.9.303
linux/linux_kernel
linux/linux_kernel
linux/Kernel
< 4.9.303linux
linux/Kernel
< 4.14.268linux
linux/Kernel
< 4.19.231linux
linux/Kernel
< 5.4.181linux
linux/Kernel
< 5.10.102linux
linux/Kernel
< 5.15.25linux
linux/Kernel
< 5.16.11linux
Timeline
Published
Jul 16, 2024
Tracked Since
Feb 18, 2026