CVE-2022-48924

Source
https://cve.org/CVERecord?id=CVE-2022-48924
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48924.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-48924
Downstream
Related
Published
2024-08-22T01:33:05.770Z
Modified
2026-04-11T12:43:16.527908Z
Summary
thermal: int340x: fix memory leak in int3400_notify()
Details

In the Linux kernel, the following vulnerability has been resolved:

thermal: int340x: fix memory leak in int3400_notify()

It is easy to hit the below memory leaks in my TigerLake platform:

unreferenced object 0xffff927c8b91dbc0 (size 32): comm "kworker/0:2", pid 112, jiffies 4294893323 (age 83.604s) hex dump (first 32 bytes): 4e 41 4d 45 3d 49 4e 54 33 34 30 30 20 54 68 65 NAME=INT3400 The 72 6d 61 6c 00 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b a5 rmal.kkkkkkkkkk. backtrace: [<ffffffff9c502c3e>] _kmalloctrackcaller+0x2fe/0x4a0 [<ffffffff9c7b7c15>] kvasprintf+0x65/0xd0 [<ffffffff9c7b7d6e>] kasprintf+0x4e/0x70 [<ffffffffc04cb662>] int3400notify+0x82/0x120 [int3400thermal] [<ffffffff9c8b7358>] acpievnotifydispatch+0x54/0x71 [<ffffffff9c88f1a7>] acpiosexecutedeferred+0x17/0x30 [<ffffffff9c2c2c0a>] processonework+0x21a/0x3f0 [<ffffffff9c2c2e2a>] workerthread+0x4a/0x3b0 [<ffffffff9c2cb4dd>] kthread+0xfd/0x130 [<ffffffff9c201c1f>] retfromfork+0x1f/0x30

Fix it by calling kfree() accordingly.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/48xxx/CVE-2022-48924.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
38e44da591303d08b0d965a033e11ade284999d0
Fixed
f0ddc5184b0127038d05008e2a69f89d1e13f980
Fixed
c3fa6d1937a8d0828131a04ae2cd2c30d0668693
Fixed
2e798814e01827871938ff172d2b2ccf1e74b355
Fixed
e098933866f9e1dd3ef4eebbe2e3d504f970f599
Fixed
ba9efbbf6745750d34c1e87c9539ce9db645ca0a
Fixed
33c73a4d7e7b19313a6b417152f5365016926418
Fixed
3abea10e6a8f0e7804ed4c124bea2d15aca977c8

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48924.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.14.0
Fixed
4.14.274
Type
ECOSYSTEM
Events
Introduced
4.15.0
Fixed
4.19.237
Type
ECOSYSTEM
Events
Introduced
4.20.0
Fixed
5.4.188
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.103
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.26
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
5.16.12

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48924.json"