Bug 1228025 (CVE-2022-48794)

Summary: VUL-0: CVE-2022-48794: kernel: net: ieee802154: at86rf230: Stop leaking skb's
Product: [Novell Products] SUSE Security Incidents Reporter: SMASH SMASH <smash_bz>
Component: IncidentsAssignee: Kernel Bugs <kernel-bugs>
Status: NEW --- QA Contact: Security Team bot <security-team>
Severity: Normal    
Priority: P4 - Low CC: andrea.mattiazzo
Version: unspecified   
Target Milestone: ---   
Hardware: Other   
OS: Other   
URL: https://smash.suse.de/issue/414215/
Whiteboard: CVSSv3.1:SUSE:CVE-2022-48794:3.3:(AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)
Found By: Security Response Team Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---

Description SMASH SMASH 2024-07-17 08:53:07 UTC
In the Linux kernel, the following vulnerability has been resolved:

net: ieee802154: at86rf230: Stop leaking skb's

Upon error the ieee802154_xmit_complete() helper is not called. Only
ieee802154_wake_queue() is called manually. In the Tx case we then leak
the skb structure.

Free the skb structure upon error before returning when appropriate.

As the 'is_tx = 0' cannot be moved in the complete handler because of a
possible race between the delay in switching to STATE_RX_AACK_ON and a
new interrupt, we introduce an intermediate 'was_tx' boolean just for
this purpose.

There is no Fixes tag applying here, many changes have been made on this
area and the issue kind of always existed.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-48794
https://git.kernel.org/pub/scm/linux/security/vulns.git/plain/cve/published/2022/CVE-2022-48794.mbox
https://git.kernel.org/stable/c/d2a1eaf51b7d4412319adb6acef114ba472d1692
https://git.kernel.org/stable/c/af649e5c95f56df64363bc46f6746b87819f9c0d
https://git.kernel.org/stable/c/6312f6a53fd3ea38125dcaca5e3c9aa7d8a60cf7
https://git.kernel.org/stable/c/455ef08d6e5473526fa6763f75a93f7198206966
https://git.kernel.org/stable/c/0fd484644c68897c490a3307bfcc8bf767df5a43
https://git.kernel.org/stable/c/23b2a25382400168427ea278f3d8bf4ecfd333bf
https://git.kernel.org/stable/c/1c72f04d52b7200bb83426a9bed378668271ea4a
https://git.kernel.org/stable/c/e5ce576d45bf72fd0e3dc37eff897bfcc488f6a9
https://www.cve.org/CVERecord?id=CVE-2022-48794
https://bugzilla.redhat.com/show_bug.cgi?id=2298130