Vulnerability identifier: #VU104249
Vulnerability risk: Low
CVSSv4.0: 1.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49331
CWE-ID:
CWE-401
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Linux kernel
Operating systems & Components /
Operating system
Vendor: Linux Foundation
Description
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the st21nfca_connectivity_event_received() function in drivers/nfc/st21nfca/se.c. A local user can perform a denial of service (DoS) attack.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Linux kernel: 5.15, 5.15 rc1, 5.15 rc2, 5.15 rc3, 5.15 rc4, 5.15 rc5, 5.15 rc6, 5.15 rc7, 5.15.0, 5.15.1, 5.15.2, 5.15.3, 5.15.4, 5.15.5, 5.15.6, 5.15.7, 5.15.8, 5.15.9, 5.15.10, 5.15.11, 5.15.12, 5.15.13, 5.15.14, 5.15.15, 5.15.16, 5.15.17, 5.15.18, 5.15.19, 5.15.20, 5.15.21, 5.15.22, 5.15.23, 5.15.24, 5.15.25, 5.15.26, 5.15.27, 5.15.28, 5.15.29, 5.15.30, 5.15.31, 5.15.32, 5.15.33, 5.15.34, 5.15.35, 5.15.36, 5.15.37, 5.15.38, 5.15.39, 5.15.40, 5.15.41, 5.15.42, 5.15.43, 5.15.44, 5.15.45, 5.15.46
External links
https://git.kernel.org/stable/c/3eca2c42daa4659965db6817479027cbc6df7899
https://git.kernel.org/stable/c/54423649bc0ed464b75807a7cf2857a5871f738f
https://git.kernel.org/stable/c/55904086041ba4ee4070187b36590f8f8d6df4cd
https://git.kernel.org/stable/c/593773088d615a46a42c97e01a0550d192bb7f74
https://git.kernel.org/stable/c/6fce324b530dd74750ad870699e33eeed1029ded
https://git.kernel.org/stable/c/996419e0594abb311fb958553809f24f38e7abbe
https://git.kernel.org/stable/c/d221ce54ce331c1a23be71eebf57f6a088632383
https://git.kernel.org/stable/c/db836b97464d44340b568e041fd24602858713f7
https://git.kernel.org/stable/c/f444ecd3f57f4ba5090fe8b6756933e37de4226e
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.47
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.