Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2022-49913 |
CWE-ID | CWE-401 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
Linux kernel Operating systems & Components / Operating system |
Vendor | Linux Foundation |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU108156
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49913
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the prelim_release() and cond_resched() functions in fs/btrfs/backref.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall update from vendor's website.
Vulnerable software versionsLinux kernel: 5.4 - 6.1 rc7
CPE2.3https://git.kernel.org/stable/c/222a3d533027b9492d5b7f5ecdc01a90f57bb5a9
https://git.kernel.org/stable/c/61e06128113711df0534c404fb6bb528eb7d2332
https://git.kernel.org/stable/c/6a6731a0df8c47ecc703bd7bb73459df767051e0
https://git.kernel.org/stable/c/83ea8c5b54d452a5769e605e3c5c687e8ca06d89
https://git.kernel.org/stable/c/92876eec382a0f19f33d09d2c939e9ca49038ae5
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.154
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.78
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.224
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.0.8
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.