In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: always free skb on ieee80211_tx_prepare_skb() failure ieee80211_tx_prepare_skb() has three error paths, but only two of them free the skb. The first error path (ieee80211_tx_prepare() returning TX_DROP) does not free it, while invoke_tx_handlers() failure and the fragmentation check both do. Add kfree_skb() to the first error path so all three are consistent, and remove the now-redundant frees in callers (ath9k, mt76, mac80211_hwsim) to avoid double-free. Document the skb ownership guarantee in the function's kdoc.
| Vendor | Product | Versions |
|---|---|---|
| linux | linux kernel | 06be6b149f7e406bcf16098567f5a6c9f042bced, 06be6b149f7e406bcf16098567f5a6c9f042bced, 06be6b149f7e406bcf16098567f5a6c9f042bced, 3.13, 6.18.20, 6.19.10, 7.0-rc5, 6.18.19, 6.19.9, 7.0-rc4 |
Updated severity to CRITICAL, added new affected versions, and noted no available exploit.
Updated description with more technical detail, added affected versions 6.18.20, 6.19.10, and 7.0-rc5, changed severity to HIGH, and marked exploit availability and active exploitation as true.
Initial creation