CVE-2022-48885

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-48885
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48885.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-48885
Downstream
Related
Published
2024-08-21T06:10:16Z
Modified
2025-10-15T15:08:46.989055Z
Summary
ice: Fix potential memory leak in ice_gnss_tty_write()
Details

In the Linux kernel, the following vulnerability has been resolved:

ice: Fix potential memory leak in icegnsstty_write()

The icegnssttywrite() return directly if the writebuf alloc failed, leaking the cmd_buf.

Fix by free cmdbuf if writebuf alloc failed.

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
d6b98c8d242aee40e7b8919dd07b593b0739e38d
Fixed
500ca1da9d0876244eb4d1b0ece6fa0e9968d45d
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
d6b98c8d242aee40e7b8919dd07b593b0739e38d
Fixed
f58985620f55580a07d40062c4115d8c9cf6ae27

Affected versions

v5.*

v5.19
v5.19-rc7
v5.19-rc8

v6.*

v6.0
v6.0-rc1
v6.0-rc2
v6.0-rc3
v6.0-rc4
v6.0-rc5
v6.0-rc6
v6.0-rc7
v6.1
v6.1-rc1
v6.1-rc2
v6.1-rc3
v6.1-rc4
v6.1-rc5
v6.1-rc6
v6.1-rc7
v6.1-rc8
v6.1.1
v6.1.2
v6.1.3
v6.1.4
v6.1.5
v6.1.6
v6.2-rc1
v6.2-rc2

Database specific

vanir_signatures

[
    {
        "signature_type": "Function",
        "id": "CVE-2022-48885-42610e53",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@500ca1da9d0876244eb4d1b0ece6fa0e9968d45d",
        "signature_version": "v1",
        "target": {
            "function": "ice_gnss_tty_write",
            "file": "drivers/net/ethernet/intel/ice/ice_gnss.c"
        },
        "digest": {
            "function_hash": "72532825484374125229027942415635890090",
            "length": 1001.0
        },
        "deprecated": false
    },
    {
        "signature_type": "Line",
        "id": "CVE-2022-48885-c65d4226",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@500ca1da9d0876244eb4d1b0ece6fa0e9968d45d",
        "signature_version": "v1",
        "target": {
            "file": "drivers/net/ethernet/intel/ice/ice_gnss.c"
        },
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "16975610437515275051194683832884671654",
                "336088725106234759183732784523656345871",
                "137271862972362085518253660112692383307",
                "266342020898566391679217183997166883368"
            ]
        },
        "deprecated": false
    },
    {
        "signature_type": "Function",
        "id": "CVE-2022-48885-f08f3020",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f58985620f55580a07d40062c4115d8c9cf6ae27",
        "signature_version": "v1",
        "target": {
            "function": "ice_gnss_tty_write",
            "file": "drivers/net/ethernet/intel/ice/ice_gnss.c"
        },
        "digest": {
            "function_hash": "72532825484374125229027942415635890090",
            "length": 1001.0
        },
        "deprecated": false
    },
    {
        "signature_type": "Line",
        "id": "CVE-2022-48885-f590c859",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f58985620f55580a07d40062c4115d8c9cf6ae27",
        "signature_version": "v1",
        "target": {
            "file": "drivers/net/ethernet/intel/ice/ice_gnss.c"
        },
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "16975610437515275051194683832884671654",
                "336088725106234759183732784523656345871",
                "137271862972362085518253660112692383307",
                "266342020898566391679217183997166883368"
            ]
        },
        "deprecated": false
    }
]

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.0.0
Fixed
6.1.7