{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2022-48794","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2024-07-16T11:38:08.894Z","datePublished":"2024-07-16T11:43:49.434Z","dateUpdated":"2025-12-23T13:20:31.740Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2025-12-23T13:20:31.740Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet: ieee802154: at86rf230: Stop leaking skb's\n\nUpon error the ieee802154_xmit_complete() helper is not called. Only\nieee802154_wake_queue() is called manually. In the Tx case we then leak\nthe skb structure.\n\nFree the skb structure upon error before returning when appropriate.\n\nAs the 'is_tx = 0' cannot be moved in the complete handler because of a\npossible race between the delay in switching to STATE_RX_AACK_ON and a\nnew interrupt, we introduce an intermediate 'was_tx' boolean just for\nthis purpose.\n\nThere is no Fixes tag applying here, many changes have been made on this\narea and the issue kind of always existed."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/net/ieee802154/at86rf230.c"],"versions":[{"version":"955aee8b5c69594b9fb38a4f65e77db343b43a38","lessThan":"d2a1eaf51b7d4412319adb6acef114ba472d1692","status":"affected","versionType":"git"},{"version":"955aee8b5c69594b9fb38a4f65e77db343b43a38","lessThan":"af649e5c95f56df64363bc46f6746b87819f9c0d","status":"affected","versionType":"git"},{"version":"955aee8b5c69594b9fb38a4f65e77db343b43a38","lessThan":"6312f6a53fd3ea38125dcaca5e3c9aa7d8a60cf7","status":"affected","versionType":"git"},{"version":"955aee8b5c69594b9fb38a4f65e77db343b43a38","lessThan":"455ef08d6e5473526fa6763f75a93f7198206966","status":"affected","versionType":"git"},{"version":"955aee8b5c69594b9fb38a4f65e77db343b43a38","lessThan":"0fd484644c68897c490a3307bfcc8bf767df5a43","status":"affected","versionType":"git"},{"version":"955aee8b5c69594b9fb38a4f65e77db343b43a38","lessThan":"23b2a25382400168427ea278f3d8bf4ecfd333bf","status":"affected","versionType":"git"},{"version":"955aee8b5c69594b9fb38a4f65e77db343b43a38","lessThan":"1c72f04d52b7200bb83426a9bed378668271ea4a","status":"affected","versionType":"git"},{"version":"955aee8b5c69594b9fb38a4f65e77db343b43a38","lessThan":"e5ce576d45bf72fd0e3dc37eff897bfcc488f6a9","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/net/ieee802154/at86rf230.c"],"versions":[{"version":"3.19","status":"affected"},{"version":"0","lessThan":"3.19","status":"unaffected","versionType":"semver"},{"version":"4.9.303","lessThanOrEqual":"4.9.*","status":"unaffected","versionType":"semver"},{"version":"4.14.268","lessThanOrEqual":"4.14.*","status":"unaffected","versionType":"semver"},{"version":"4.19.231","lessThanOrEqual":"4.19.*","status":"unaffected","versionType":"semver"},{"version":"5.4.181","lessThanOrEqual":"5.4.*","status":"unaffected","versionType":"semver"},{"version":"5.10.102","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.25","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"5.16.11","lessThanOrEqual":"5.16.*","status":"unaffected","versionType":"semver"},{"version":"5.17","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.19","versionEndExcluding":"4.9.303"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.19","versionEndExcluding":"4.14.268"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.19","versionEndExcluding":"4.19.231"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.19","versionEndExcluding":"5.4.181"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.19","versionEndExcluding":"5.10.102"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.19","versionEndExcluding":"5.15.25"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.19","versionEndExcluding":"5.16.11"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.19","versionEndExcluding":"5.17"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/d2a1eaf51b7d4412319adb6acef114ba472d1692"},{"url":"https://git.kernel.org/stable/c/af649e5c95f56df64363bc46f6746b87819f9c0d"},{"url":"https://git.kernel.org/stable/c/6312f6a53fd3ea38125dcaca5e3c9aa7d8a60cf7"},{"url":"https://git.kernel.org/stable/c/455ef08d6e5473526fa6763f75a93f7198206966"},{"url":"https://git.kernel.org/stable/c/0fd484644c68897c490a3307bfcc8bf767df5a43"},{"url":"https://git.kernel.org/stable/c/23b2a25382400168427ea278f3d8bf4ecfd333bf"},{"url":"https://git.kernel.org/stable/c/1c72f04d52b7200bb83426a9bed378668271ea4a"},{"url":"https://git.kernel.org/stable/c/e5ce576d45bf72fd0e3dc37eff897bfcc488f6a9"}],"title":"net: ieee802154: at86rf230: Stop leaking skb's","x_generator":{"engine":"bippy-1.2.0"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T15:25:01.536Z"},"title":"CVE Program Container","references":[{"url":"https://git.kernel.org/stable/c/d2a1eaf51b7d4412319adb6acef114ba472d1692","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/af649e5c95f56df64363bc46f6746b87819f9c0d","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/6312f6a53fd3ea38125dcaca5e3c9aa7d8a60cf7","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/455ef08d6e5473526fa6763f75a93f7198206966","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/0fd484644c68897c490a3307bfcc8bf767df5a43","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/23b2a25382400168427ea278f3d8bf4ecfd333bf","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/1c72f04d52b7200bb83426a9bed378668271ea4a","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/e5ce576d45bf72fd0e3dc37eff897bfcc488f6a9","tags":["x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2022-48794","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"version":"2.0.3","timestamp":"2024-09-10T16:59:25.809621Z"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-09-11T17:34:15.221Z"}}]}}