CVE-2022-48768

Source
https://cve.org/CVERecord?id=CVE-2022-48768
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48768.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-48768
Downstream
Related
Published
2024-06-20T11:13:43.830Z
Modified
2026-03-20T12:21:50.862220Z
Summary
tracing/histogram: Fix a potential memory leak for kstrdup()
Details

In the Linux kernel, the following vulnerability has been resolved:

tracing/histogram: Fix a potential memory leak for kstrdup()

kfree() is missing on an error path to free the memory allocated by kstrdup():

p = param = kstrdup(data->params[i], GFP_KERNEL);

So it is better to free it via kfree(p).

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/48xxx/CVE-2022-48768.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
38b67e60b6b582e81f9db1b2e7176cbbfbd3e574
Fixed
8a8878ebb596281f50fc0b9a6e1f23f0d7f154e8
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
d380dcde9a07ca5de4805dee11f58a98ec0ad6ff
Fixed
d71b06aa995007eafd247626d0669b9364c42ad7
Fixed
e33fa4a46ee22de88a700e2e3d033da8214a5175
Fixed
df86e2fe808c3536a9dba353cc2bebdfea00d0cf
Fixed
e629e7b525a179e29d53463d992bdee759c950fb
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
c78a2baf5e1fe1b38121d6b54bab77ccb81a1a86

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48768.json"