Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2022-49212 |
CWE-ID | CWE-401 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
Linux kernel Operating systems & Components / Operating system |
Vendor | Linux Foundation |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU104397
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49212
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the atmel_nand_controller_init() function in drivers/mtd/nand/atmel/nand-controller.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall update from vendor's website.
Vulnerable software versionsLinux kernel: 4.14 - 5.18 rc8
CPE2.3https://git.kernel.org/stable/c/0856bf27057561f42b37df111603cf5a0d040294
https://git.kernel.org/stable/c/8baea2b96fa90af8d0f937caf4cf2105ee094d93
https://git.kernel.org/stable/c/9843c9c98f26c6ad843260b19bfdaa2598f2ae1e
https://git.kernel.org/stable/c/9b08d211db4c447eb1a07df65e45e0aa772e0fa6
https://git.kernel.org/stable/c/a3587259ae553e41d1ce8c7435351a5d6b299a11
https://git.kernel.org/stable/c/f1694169f3674cdf7553aed06864254635679878
https://git.kernel.org/stable/c/fe0e2ce5c87e9c0b9485ff566362030aa55972cf
https://git.kernel.org/stable/c/fecbd4a317c95d73c849648c406bcf1b6a0ec1cf
https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.276
https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.238
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.110
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.33
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.19
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.2
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.18
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.189
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.