Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2022-49422 |
CWE-ID | CWE-401 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
Linux kernel Operating systems & Components / Operating system |
Vendor | Linux Foundation |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU104275
Risk: Low
CVSSv4.0: 1.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49422
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the idxd_cdev_register() function in drivers/dma/idxd/cdev.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall update from vendor's website.
Vulnerable software versionsLinux kernel: 5.18 - 5.18.2
CPE2.3https://git.kernel.org/stable/c/5e88561eceb34ae3f88451c2b8e30fe403484189
https://git.kernel.org/stable/c/6073af78156b8c3fc1198f8bcc190b7ac3ac0143
https://git.kernel.org/stable/c/aab08c1aac01097815fbcf10fce7021d2396a31f
https://git.kernel.org/stable/c/b3c7b5d08e9d5b2ff31c03078c00ecf11042419f
https://git.kernel.org/stable/c/c308a2e711a52a47f4b45e7add2b5200169e429a
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.18.3
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.