#VU102285 Input validation error in Linux kernel - CVE-2022-49035


| Updated: 2025-05-11

Vulnerability identifier: #VU102285

Vulnerability risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49035

CWE-ID: CWE-20

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the s5p_cec_irq_handler() function in drivers/media/cec/platform/s5p/s5p_cec.c. A local user can perform a denial of service (DoS) attack.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel: 4.14, 4.14.0, 4.14.0 rc1, 4.14.1, 4.14.2, 4.14.3, 4.14.4, 4.14.5, 4.14.6, 4.14.7, 4.14.8, 4.14.9, 4.14.10, 4.14.11, 4.14.12, 4.14.13, 4.14.14, 4.14.15, 4.14.16, 4.14.17, 4.14.18, 4.14.19, 4.14.20, 4.14.21, 4.14.22, 4.14.23, 4.14.24, 4.14.25, 4.14.26, 4.14.27, 4.14.28, 4.14.29, 4.14.30, 4.14.31, 4.14.32, 4.14.33, 4.14.34, 4.14.35, 4.14.36, 4.14.37, 4.14.38, 4.14.39, 4.14.40, 4.14.41, 4.14.42, 4.14.43, 4.14.44, 4.14.45, 4.14.46, 4.14.47, 4.14.48, 4.14.49, 4.14.50, 4.14.51, 4.14.52, 4.14.53, 4.14.54, 4.14.55, 4.14.56, 4.14.57, 4.14.58, 4.14.59, 4.14.60, 4.14.61, 4.14.62, 4.14.63, 4.14.64, 4.14.65, 4.14.66, 4.14.67, 4.14.68, 4.14.69, 4.14.70, 4.14.71, 4.14.72, 4.14.73, 4.14.74, 4.14.75, 4.14.76, 4.14.77, 4.14.78, 4.14.79, 4.14.80, 4.14.81, 4.14.82, 4.14.83, 4.14.84, 4.14.85, 4.14.86, 4.14.87, 4.14.88, 4.14.89, 4.14.90, 4.14.91, 4.14.92, 4.14.93, 4.14.94, 4.14.95, 4.14.96, 4.14.97, 4.14.98, 4.14.99, 4.14.100, 4.14.101, 4.14.102, 4.14.103, 4.14.104, 4.14.105, 4.14.106, 4.14.107, 4.14.108, 4.14.109, 4.14.110, 4.14.111, 4.14.112, 4.14.113, 4.14.114, 4.14.115, 4.14.116, 4.14.117, 4.14.118, 4.14.119, 4.14.120, 4.14.121, 4.14.122, 4.14.123, 4.14.124, 4.14.125, 4.14.126, 4.14.127, 4.14.128, 4.14.129, 4.14.130, 4.14.131, 4.14.132, 4.14.133, 4.14.134, 4.14.135, 4.14.136, 4.14.137, 4.14.138, 4.14.139, 4.14.140, 4.14.141, 4.14.142, 4.14.143, 4.14.144, 4.14.145, 4.14.146, 4.14.147, 4.14.148, 4.14.149, 4.14.150, 4.14.151, 4.14.152, 4.14.153, 4.14.154, 4.14.155, 4.14.156, 4.14.157, 4.14.158, 4.14.159, 4.14.160, 4.14.161, 4.14.162, 4.14.163, 4.14.164, 4.14.165, 4.14.166, 4.14.167, 4.14.168, 4.14.169, 4.14.170, 4.14.171, 4.14.172, 4.14.173, 4.14.174, 4.14.175, 4.14.176, 4.14.177, 4.14.178, 4.14.179, 4.14.180, 4.14.181, 4.14.182, 4.14.183, 4.14.184, 4.14.185, 4.14.186, 4.14.187, 4.14.188, 4.14.189, 4.14.190, 4.14.191, 4.14.192, 4.14.193, 4.14.194, 4.14.195, 4.14.196, 4.14.197, 4.14.198, 4.14.199, 4.14.200, 4.14.201, 4.14.202, 4.14.203, 4.14.204, 4.14.205, 4.14.206, 4.14.207, 4.14.208, 4.14.209, 4.14.210, 4.14.211, 4.14.212, 4.14.213, 4.14.214, 4.14.215, 4.14.216, 4.14.217, 4.14.218, 4.14.219, 4.14.220, 4.14.221, 4.14.222, 4.14.223, 4.14.224, 4.14.225, 4.14.226, 4.14.227, 4.14.228, 4.14.229, 4.14.230, 4.14.231, 4.14.232, 4.14.233, 4.14.234, 4.14.235, 4.14.236, 4.14.237, 4.14.238, 4.14.239, 4.14.240, 4.14.241, 4.14.242, 4.14.243, 4.14.244, 4.14.245, 4.14.246, 4.14.247, 4.14.248, 4.14.249, 4.14.250, 4.14.251, 4.14.252, 4.14.253, 4.14.254, 4.14.255, 4.14.256, 4.14.257, 4.14.258, 4.14.259, 4.14.260, 4.14.261, 4.14.262, 4.14.263, 4.14.264, 4.14.265, 4.14.266, 4.14.267, 4.14.268, 4.14.269, 4.14.270, 4.14.271, 4.14.272, 4.14.273, 4.14.274, 4.14.275, 4.14.276, 4.14.277, 4.14.278, 4.14.279, 4.14.280, 4.14.281, 4.14.282, 4.14.283, 4.14.284, 4.14.285, 4.14.286, 4.14.287, 4.14.288, 4.14.289, 4.14.290, 4.14.291, 4.14.292, 4.14.293, 4.14.294, 4.14.295, 4.14.296, 4.14.297, 4.14.298


External links
https://git.kernel.org/stable/c/1609231f86760c1f6a429de7913dd795b9faa08c
https://git.kernel.org/stable/c/2654e785bd4aa2439cdffbe7dc1ea30a0eddbfe4
https://git.kernel.org/stable/c/4a449430ecfb199b99ba58af63c467eb53500b39
https://git.kernel.org/stable/c/7ccb40f26cbefa1c6dfd3418bea54c9518cdbd8a
https://git.kernel.org/stable/c/93f65ce036863893c164ca410938e0968964b26c
https://git.kernel.org/stable/c/a2728bf9b6c65e46468c763e3dab7e04839d4e11
https://git.kernel.org/stable/c/cbfa26936f318b16ccf9ca31b8e8b30c0dc087bd
https://git.kernel.org/stable/c/fc0f76dd5f116fa9291327024dda392f8b4e849c
https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.299


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability