#VU104337 Memory leak in Linux kernel - CVE-2022-49680


Vulnerability identifier: #VU104337

Vulnerability risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49680

CWE-ID: CWE-401

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the exynos_map_pmu() function in arch/arm/mach-exynos/exynos.c. A local user can perform a denial of service (DoS) attack.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel: All versions


External links
https://git.kernel.org/stable/c/31d09571bb071c20f6bdc0bb7ac1ef8dd2987c04
https://git.kernel.org/stable/c/545ae5cbae839ce39bfe09828e413f1c916082de
https://git.kernel.org/stable/c/68f28d52e6cbab8dcfa249cac4356d1d0573e868
https://git.kernel.org/stable/c/7571bcecf01b69f0d3ec60ca41ce5d4c75411a4a
https://git.kernel.org/stable/c/c4c79525042a4a7df96b73477feaf232fe44ae81
https://git.kernel.org/stable/c/d23f76018e17618559da9eea179d137362023f95
https://git.kernel.org/stable/c/f9b77a52937582a5b99a5a07e4ef1e2f48f87347
https://git.kernel.org/stable/c/fc354856e9fad9cd36e2ad28f9da70716025055a


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability