First published: Thu Sep 08 2022(Updated: )
An issue was discovered in Samsung TizenRT through 3.0_GBM (and 3.1_PRE). l2_packet_receive_timeout in wpa_supplicant/src/l2_packet/l2_packet_pcap.c has a missing check on the return value of pcap_dispatch, leading to a denial of service (malfunction).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Samsung TizenRT | =1.0-m1 | |
Samsung TizenRT | =1.1 | |
Samsung TizenRT | =2.0-gbm_m1 | |
Samsung TizenRT | =2.0-m2 | |
Samsung TizenRT | =3.0-gbm | |
Samsung TizenRT | =3.1-pre |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-40279 has been classified with a severity that can lead to a denial of service.
To resolve CVE-2022-40279, ensure an updated version of TizenRT is deployed that addresses the missing return value check in the affected source code.
The affected versions of Samsung TizenRT include 1.0-m1, 1.1, 2.0-gbm_m1, 2.0-m2, 3.0-gbm, and 3.1-pre.
CVE-2022-40279 represents a denial of service issue caused by a missing check on the return value of pcap_dispatch.
CVE-2022-40279 was discovered in the l2_packet_pcap.c file located in the wpa_supplicant source directory.