Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2022-49091 |
CWE-ID | CWE-401 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
Linux kernel Operating systems & Components / Operating system |
Vendor | Linux Foundation |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU104361
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49091
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the imx_pd_connector_get_modes() function in drivers/gpu/drm/imx/parallel-display.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall update from vendor's website.
Vulnerable software versionsLinux kernel: All versions
CPE2.3 External linkshttps://git.kernel.org/stable/c/31e449302ed00c38d4068443cf0243279701ab28
https://git.kernel.org/stable/c/38bf605bd8c83d942c8dcffaef3633b7d8b37549
https://git.kernel.org/stable/c/41624d7c0c3df71dee170c610744aaa5909327b8
https://git.kernel.org/stable/c/7526102d908ec5ae777aa77723d52fce12916093
https://git.kernel.org/stable/c/bc23c327e1a23cc3555fa1e86288e13288515442
https://git.kernel.org/stable/c/bce81feb03a20fca7bbdd1c4af16b4e9d5c0e1d3
https://git.kernel.org/stable/c/c539a6a5896ed92bfb91494e46996d013f3d5967
https://git.kernel.org/stable/c/d2c2758cfb0262637fd93350bdc8ad485fb1dd61
https://git.kernel.org/stable/c/f8b0ef0a5889890b50482b6593bd8de544736351
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.