#VU104249 Memory leak in Linux kernel - CVE-2022-49331


| Updated: 2025-05-11

Vulnerability identifier: #VU104249

Vulnerability risk: Low

CVSSv4.0: 1.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49331

CWE-ID: CWE-401

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the st21nfca_connectivity_event_received() function in drivers/nfc/st21nfca/se.c. A local user can perform a denial of service (DoS) attack.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel: 5.15, 5.15 rc1, 5.15 rc2, 5.15 rc3, 5.15 rc4, 5.15 rc5, 5.15 rc6, 5.15 rc7, 5.15.0, 5.15.1, 5.15.2, 5.15.3, 5.15.4, 5.15.5, 5.15.6, 5.15.7, 5.15.8, 5.15.9, 5.15.10, 5.15.11, 5.15.12, 5.15.13, 5.15.14, 5.15.15, 5.15.16, 5.15.17, 5.15.18, 5.15.19, 5.15.20, 5.15.21, 5.15.22, 5.15.23, 5.15.24, 5.15.25, 5.15.26, 5.15.27, 5.15.28, 5.15.29, 5.15.30, 5.15.31, 5.15.32, 5.15.33, 5.15.34, 5.15.35, 5.15.36, 5.15.37, 5.15.38, 5.15.39, 5.15.40, 5.15.41, 5.15.42, 5.15.43, 5.15.44, 5.15.45, 5.15.46


External links
https://git.kernel.org/stable/c/3eca2c42daa4659965db6817479027cbc6df7899
https://git.kernel.org/stable/c/54423649bc0ed464b75807a7cf2857a5871f738f
https://git.kernel.org/stable/c/55904086041ba4ee4070187b36590f8f8d6df4cd
https://git.kernel.org/stable/c/593773088d615a46a42c97e01a0550d192bb7f74
https://git.kernel.org/stable/c/6fce324b530dd74750ad870699e33eeed1029ded
https://git.kernel.org/stable/c/996419e0594abb311fb958553809f24f38e7abbe
https://git.kernel.org/stable/c/d221ce54ce331c1a23be71eebf57f6a088632383
https://git.kernel.org/stable/c/db836b97464d44340b568e041fd24602858713f7
https://git.kernel.org/stable/c/f444ecd3f57f4ba5090fe8b6756933e37de4226e
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.47


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability