Vulnerability identifier: #VU104337
Vulnerability risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49680
CWE-ID:
CWE-401
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Linux kernel
Operating systems & Components /
Operating system
Vendor: Linux Foundation
Description
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the exynos_map_pmu() function in arch/arm/mach-exynos/exynos.c. A local user can perform a denial of service (DoS) attack.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Linux kernel: All versions
External links
https://git.kernel.org/stable/c/31d09571bb071c20f6bdc0bb7ac1ef8dd2987c04
https://git.kernel.org/stable/c/545ae5cbae839ce39bfe09828e413f1c916082de
https://git.kernel.org/stable/c/68f28d52e6cbab8dcfa249cac4356d1d0573e868
https://git.kernel.org/stable/c/7571bcecf01b69f0d3ec60ca41ce5d4c75411a4a
https://git.kernel.org/stable/c/c4c79525042a4a7df96b73477feaf232fe44ae81
https://git.kernel.org/stable/c/d23f76018e17618559da9eea179d137362023f95
https://git.kernel.org/stable/c/f9b77a52937582a5b99a5a07e4ef1e2f48f87347
https://git.kernel.org/stable/c/fc354856e9fad9cd36e2ad28f9da70716025055a
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.