{"id":"CVE-2022-48768","summary":"tracing/histogram: Fix a potential memory leak for kstrdup()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\ntracing/histogram: Fix a potential memory leak for kstrdup()\n\nkfree() is missing on an error path to free the memory allocated by\nkstrdup():\n\n  p = param = kstrdup(data-\u003eparams[i], GFP_KERNEL);\n\nSo it is better to free it via kfree(p).","modified":"2026-04-11T12:41:18.394426Z","published":"2024-06-20T11:13:43.830Z","related":["SUSE-SU-2024:2362-1","SUSE-SU-2024:2372-1","SUSE-SU-2024:2384-1","SUSE-SU-2024:2394-1","SUSE-SU-2024:2902-1","SUSE-SU-2024:2929-1","SUSE-SU-2024:2939-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/48xxx/CVE-2022-48768.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/8a8878ebb596281f50fc0b9a6e1f23f0d7f154e8"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d71b06aa995007eafd247626d0669b9364c42ad7"},{"type":"WEB","url":"https://git.kernel.org/stable/c/df86e2fe808c3536a9dba353cc2bebdfea00d0cf"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e33fa4a46ee22de88a700e2e3d033da8214a5175"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e629e7b525a179e29d53463d992bdee759c950fb"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/48xxx/CVE-2022-48768.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-48768"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"38b67e60b6b582e81f9db1b2e7176cbbfbd3e574"},{"fixed":"8a8878ebb596281f50fc0b9a6e1f23f0d7f154e8"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"d380dcde9a07ca5de4805dee11f58a98ec0ad6ff"},{"fixed":"d71b06aa995007eafd247626d0669b9364c42ad7"},{"fixed":"e33fa4a46ee22de88a700e2e3d033da8214a5175"},{"fixed":"df86e2fe808c3536a9dba353cc2bebdfea00d0cf"},{"fixed":"e629e7b525a179e29d53463d992bdee759c950fb"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"0"},{"last_affected":"c78a2baf5e1fe1b38121d6b54bab77ccb81a1a86"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48768.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.4.176"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.5.0"},{"fixed":"5.10.96"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.6.0"},{"fixed":"5.15.19"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.16.5"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48768.json"}}],"schema_version":"1.7.5"}