Bug 2298130 (CVE-2022-48794) - CVE-2022-48794 kernel: net: ieee802154: at86rf230: Stop leaking skb's
Summary: CVE-2022-48794 kernel: net: ieee802154: at86rf230: Stop leaking skb's
Keywords:
Status: NEW
Alias: CVE-2022-48794
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2024-07-16 12:26 UTC by OSIDB Bzimport
Modified: 2024-09-20 15:34 UTC (History)
4 users (show)

Fixed In Version: kernel 4.9.303, kernel 4.14.268, kernel 4.19.231, kernel 5.4.181, kernel 5.10.102, kernel 5.15.25, kernel 5.16.11, kernel 5.17
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2024-07-16 12:26:46 UTC
In the Linux kernel, the following vulnerability has been resolved:

net: ieee802154: at86rf230: Stop leaking skb's

Upon error the ieee802154_xmit_complete() helper is not called. Only
ieee802154_wake_queue() is called manually. In the Tx case we then leak
the skb structure.

Free the skb structure upon error before returning when appropriate.

As the 'is_tx = 0' cannot be moved in the complete handler because of a
possible race between the delay in switching to STATE_RX_AACK_ON and a
new interrupt, we introduce an intermediate 'was_tx' boolean just for
this purpose.

There is no Fixes tag applying here, many changes have been made on this
area and the issue kind of always existed.


Note You need to log in before you can comment on or make changes to this bug.