CVE-2022-48957

Source
https://cve.org/CVERecord?id=CVE-2022-48957
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48957.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-48957
Downstream
Related
Published
2024-10-21T20:05:43.107Z
Modified
2026-03-12T03:24:17.884774Z
Summary
dpaa2-switch: Fix memory leak in dpaa2_switch_acl_entry_add() and dpaa2_switch_acl_entry_remove()
Details

In the Linux kernel, the following vulnerability has been resolved:

dpaa2-switch: Fix memory leak in dpaa2switchaclentryadd() and dpaa2switchaclentryremove()

The cmdbuff needs to be freed when error happened in dpaa2switchaclentryadd() and dpaa2switchaclentry_remove().

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/48xxx/CVE-2022-48957.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
1110318d83e8011c4dfcb2f7dd343bcfb1623c5f
Fixed
54d830e24247fa8361b016dd2069362866f45cb6
Fixed
785ee7a82297e1512d9061aae91699212ed65796
Fixed
4fad22a1281c500f15b172c9d261eff347ca634b

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48957.json"