CVE-2022-48995
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
21/10/2024
Last modified:
25/10/2024
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
Input: raydium_ts_i2c - fix memory leak in raydium_i2c_send()<br />
<br />
There is a kmemleak when test the raydium_i2c_ts with bpf mock device:<br />
<br />
unreferenced object 0xffff88812d3675a0 (size 8):<br />
comm "python3", pid 349, jiffies 4294741067 (age 95.695s)<br />
hex dump (first 8 bytes):<br />
11 0e 10 c0 01 00 04 00 ........<br />
backtrace:<br />
[] __kmalloc+0x46/0x1b0<br />
[] raydium_i2c_send+0xd4/0x2bf [raydium_i2c_ts]<br />
[] raydium_i2c_initialize.cold+0xbc/0x3e4 [raydium_i2c_ts]<br />
[] raydium_i2c_probe+0x3cd/0x6bc [raydium_i2c_ts]<br />
[] i2c_device_probe+0x651/0x680<br />
[] really_probe+0x17c/0x3f0<br />
[] __driver_probe_device+0xe3/0x170<br />
[] driver_probe_device+0x49/0x120<br />
[] __device_attach_driver+0xf7/0x150<br />
[] bus_for_each_drv+0x114/0x180<br />
[] __device_attach+0x1e5/0x2d0<br />
[] bus_probe_device+0x126/0x140<br />
[] device_add+0x810/0x1130<br />
[] i2c_new_client_device+0x352/0x4e0<br />
[] of_i2c_register_device+0xf1/0x110<br />
[] of_i2c_notify+0x100/0x160<br />
unreferenced object 0xffff88812d3675c8 (size 8):<br />
comm "python3", pid 349, jiffies 4294741070 (age 95.692s)<br />
hex dump (first 8 bytes):<br />
22 00 36 2d 81 88 ff ff ".6-....<br />
backtrace:<br />
[] __kmalloc+0x46/0x1b0<br />
[] raydium_i2c_send+0xd4/0x2bf [raydium_i2c_ts]<br />
[] raydium_i2c_initialize.cold+0x223/0x3e4 [raydium_i2c_ts]<br />
[] raydium_i2c_probe+0x3cd/0x6bc [raydium_i2c_ts]<br />
[] i2c_device_probe+0x651/0x680<br />
[] really_probe+0x17c/0x3f0<br />
[] __driver_probe_device+0xe3/0x170<br />
[] driver_probe_device+0x49/0x120<br />
[] __device_attach_driver+0xf7/0x150<br />
[] bus_for_each_drv+0x114/0x180<br />
[] __device_attach+0x1e5/0x2d0<br />
[] bus_probe_device+0x126/0x140<br />
[] device_add+0x810/0x1130<br />
[] i2c_new_client_device+0x352/0x4e0<br />
[] of_i2c_register_device+0xf1/0x110<br />
[] of_i2c_notify+0x100/0x160<br />
<br />
After BANK_SWITCH command from i2c BUS, no matter success or error<br />
happened, the tx_buf should be freed.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.10 (including) | 5.10.158 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.82 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.0.12 (excluding) |
cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:6.1:rc6:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:6.1:rc7:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page