In the Linux kernel, the following vulnerability has been resolved:
tracing/histogram: Fix a potential memory leak for kstrdup()
kfree() is missing on an error path to free the memory allocated by kstrdup():
p = param = kstrdup(data->params[i], GFP_KERNEL);
So it is better to free it via kfree(p).
{ "vanir_signatures": [ { "signature_type": "Function", "signature_version": "v1", "digest": { "length": 1745.0, "function_hash": "133904735867243504869217486147060471011" }, "id": "CVE-2022-48768-13032a39", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d71b06aa995007eafd247626d0669b9364c42ad7", "deprecated": false, "target": { "file": "kernel/trace/trace_events_hist.c", "function": "trace_action_create" } }, { "signature_type": "Function", "signature_version": "v1", "digest": { "length": 1745.0, "function_hash": "133904735867243504869217486147060471011" }, "id": "CVE-2022-48768-52a26294", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@8a8878ebb596281f50fc0b9a6e1f23f0d7f154e8", "deprecated": false, "target": { "file": "kernel/trace/trace_events_hist.c", "function": "trace_action_create" } }, { "signature_type": "Function", "signature_version": "v1", "digest": { "length": 1745.0, "function_hash": "133904735867243504869217486147060471011" }, "id": "CVE-2022-48768-832db933", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@df86e2fe808c3536a9dba353cc2bebdfea00d0cf", "deprecated": false, "target": { "file": "kernel/trace/trace_events_hist.c", "function": "trace_action_create" } }, { "signature_type": "Line", "signature_version": "v1", "digest": { "threshold": 0.9, "line_hashes": [ "240846037776033031931438855967773040829", "222659597682754043466580468891628691789", "321447590609210057592838603135573099699", "254688550573315937480782999372402789991" ] }, "id": "CVE-2022-48768-849a33fa", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@df86e2fe808c3536a9dba353cc2bebdfea00d0cf", "deprecated": false, "target": { "file": "kernel/trace/trace_events_hist.c" } }, { "signature_type": "Function", "signature_version": "v1", "digest": { "length": 1745.0, "function_hash": "133904735867243504869217486147060471011" }, "id": "CVE-2022-48768-862c6f9c", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e33fa4a46ee22de88a700e2e3d033da8214a5175", "deprecated": false, "target": { "file": "kernel/trace/trace_events_hist.c", "function": "trace_action_create" } }, { "signature_type": "Line", "signature_version": "v1", "digest": { "threshold": 0.9, "line_hashes": [ "240846037776033031931438855967773040829", "222659597682754043466580468891628691789", "321447590609210057592838603135573099699", "254688550573315937480782999372402789991" ] }, "id": "CVE-2022-48768-8cc6e29c", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d71b06aa995007eafd247626d0669b9364c42ad7", "deprecated": false, "target": { "file": "kernel/trace/trace_events_hist.c" } }, { "signature_type": "Line", "signature_version": "v1", "digest": { "threshold": 0.9, "line_hashes": [ "240846037776033031931438855967773040829", "222659597682754043466580468891628691789", "321447590609210057592838603135573099699", "254688550573315937480782999372402789991" ] }, "id": "CVE-2022-48768-c1293894", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@8a8878ebb596281f50fc0b9a6e1f23f0d7f154e8", "deprecated": false, "target": { "file": "kernel/trace/trace_events_hist.c" } }, { "signature_type": "Line", "signature_version": "v1", "digest": { "threshold": 0.9, "line_hashes": [ "240846037776033031931438855967773040829", "222659597682754043466580468891628691789", "321447590609210057592838603135573099699", "254688550573315937480782999372402789991" ] }, "id": "CVE-2022-48768-c71a9fa2", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e33fa4a46ee22de88a700e2e3d033da8214a5175", "deprecated": false, "target": { "file": "kernel/trace/trace_events_hist.c" } } ] }