Executive Summary

Informations
Name CVE-2022-48924 First vendor Publication 2024-08-22
Vendor Cve Last vendor Modification 2024-08-27

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Overall CVSS Score 5.5
Base Score 5.5 Environmental Score 5.5
impact SubScore 3.6 Temporal Score 5.5
Exploitabality Sub Score 1.8
 
Attack Vector Local Attack Complexity Low
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact None
Integrity Impact None Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

thermal: int340x: fix memory leak in int3400_notify()

It is easy to hit the below memory leaks in my TigerLake platform:

unreferenced object 0xffff927c8b91dbc0 (size 32):
comm "kworker/0:2", pid 112, jiffies 4294893323 (age 83.604s)
hex dump (first 32 bytes):
4e 41 4d 45 3d 49 4e 54 33 34 30 30 20 54 68 65 NAME=INT3400 The
72 6d 61 6c 00 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b a5 rmal.kkkkkkkkkk.
backtrace:
[] __kmalloc_track_caller+0x2fe/0x4a0
[] kvasprintf+0x65/0xd0
[] kasprintf+0x4e/0x70
[] int3400_notify+0x82/0x120 [int3400_thermal]
[] acpi_ev_notify_dispatch+0x54/0x71
[] acpi_os_execute_deferred+0x17/0x30
[] process_one_work+0x21a/0x3f0
[] worker_thread+0x4a/0x3b0
[] kthread+0xfd/0x130
[] ret_from_fork+0x1f/0x30

Fix it by calling kfree() accordingly.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48924

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-401 Failure to Release Memory Before Removing Last Reference ('Memory Leak')

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 7
Os 3504

Sources (Detail)

https://git.kernel.org/stable/c/2e798814e01827871938ff172d2b2ccf1e74b355
https://git.kernel.org/stable/c/33c73a4d7e7b19313a6b417152f5365016926418
https://git.kernel.org/stable/c/3abea10e6a8f0e7804ed4c124bea2d15aca977c8
https://git.kernel.org/stable/c/ba9efbbf6745750d34c1e87c9539ce9db645ca0a
https://git.kernel.org/stable/c/c3fa6d1937a8d0828131a04ae2cd2c30d0668693
https://git.kernel.org/stable/c/e098933866f9e1dd3ef4eebbe2e3d504f970f599
https://git.kernel.org/stable/c/f0ddc5184b0127038d05008e2a69f89d1e13f980
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
Date Informations
2025-01-08 02:47:30
  • Multiple Updates
2025-01-07 02:47:07
  • Multiple Updates
2024-12-25 02:45:54
  • Multiple Updates
2024-12-12 02:48:47
  • Multiple Updates
2024-11-22 02:46:12
  • Multiple Updates
2024-11-20 02:43:36
  • Multiple Updates
2024-11-14 02:43:28
  • Multiple Updates
2024-11-09 02:44:07
  • Multiple Updates
2024-10-26 02:41:53
  • Multiple Updates
2024-10-25 02:43:38
  • Multiple Updates
2024-10-23 02:43:02
  • Multiple Updates
2024-10-03 02:39:06
  • Multiple Updates
2024-10-02 02:37:30
  • Multiple Updates
2024-09-03 21:27:41
  • Multiple Updates
2024-08-27 21:27:48
  • Multiple Updates
2024-08-23 02:48:13
  • Multiple Updates
2024-08-23 02:34:45
  • Multiple Updates
2024-08-22 17:27:24
  • Multiple Updates
2024-08-22 09:27:25
  • First insertion