U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2022-48722 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: net: ieee802154: ca8210: Stop leaking skb's Upon error the ieee802154_xmit_complete() helper is not called. Only ieee802154_wake_queue() is called manually. We then leak the skb structure. Free the skb structure upon error before returning.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource
https://git.kernel.org/stable/c/21feb6df3967541931242c427fe0958276af81cc
https://git.kernel.org/stable/c/21feb6df3967541931242c427fe0958276af81cc
https://git.kernel.org/stable/c/621b24b09eb61c63f262da0c9c5f0e93348897e5
https://git.kernel.org/stable/c/621b24b09eb61c63f262da0c9c5f0e93348897e5
https://git.kernel.org/stable/c/6f38d3a6ec11c2733b1c641a46a2a2ecec57be08
https://git.kernel.org/stable/c/6f38d3a6ec11c2733b1c641a46a2a2ecec57be08
https://git.kernel.org/stable/c/78b3f20c17cbcb7645bfa63f2ca0e11b53c09d56
https://git.kernel.org/stable/c/78b3f20c17cbcb7645bfa63f2ca0e11b53c09d56
https://git.kernel.org/stable/c/94cd597e20ed4acedb8f15f029d92998b011cb1a
https://git.kernel.org/stable/c/94cd597e20ed4acedb8f15f029d92998b011cb1a
https://git.kernel.org/stable/c/a1c277b0ed2a13e7de923b5f03bc23586eceb851
https://git.kernel.org/stable/c/a1c277b0ed2a13e7de923b5f03bc23586eceb851
https://git.kernel.org/stable/c/d6a44feb2f28d71a7e725f72d09c97c81561cd9a
https://git.kernel.org/stable/c/d6a44feb2f28d71a7e725f72d09c97c81561cd9a

Weakness Enumeration

CWE-ID CWE Name Source

Change History

2 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2022-48722
NVD Published Date:
06/20/2024
NVD Last Modified:
11/21/2024
Source:
kernel.org