Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2022-49677 |
CWE-ID | CWE-401 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
Linux kernel Operating systems & Components / Operating system |
Vendor | Linux Foundation |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU104334
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49677
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the cns3xxx_init() function in arch/arm/mach-cns3xxx/core.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall update from vendor's website.
Vulnerable software versionsLinux kernel: 5.18 - 5.18.7
CPE2.3https://git.kernel.org/stable/c/1ba904b6b16e08de5aed7c1349838d9cd0d178c5
https://git.kernel.org/stable/c/45bebbc8cea7d586a6216dc62814bdb380b9b29b
https://git.kernel.org/stable/c/68d4303bf59662b64bd555e2aa0518282d20aa4f
https://git.kernel.org/stable/c/b8b84e01ca94e2e1f5492353e9c24dab520b2e5b
https://git.kernel.org/stable/c/c980392af1473d6d5662f70d8089c8e6d85144a4
https://git.kernel.org/stable/c/d1359e4129ad43e43972a28838b87291c51de23d
https://git.kernel.org/stable/c/da3ee7cd2f15922ad88a7ca6deee2eafdc7cd214
https://git.kernel.org/stable/c/dc5170aae24e04068fd5ea125d06c0ab51f48a27
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.18.8
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.