#VU94394 Memory leak in Linux kernel


Published: 2024-07-17

Vulnerability identifier: #VU94394

Vulnerability risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-48860

CWE-ID: CWE-401

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the xemaclite_of_probe() function in drivers/net/ethernet/xilinx/xilinx_emaclite.c. A local user can perform a denial of service (DoS) attack.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel:


External links
http://git.kernel.org/stable/c/669172ce976608b25a2f76f3c65d47f042d125c9
http://git.kernel.org/stable/c/b7220f8e9d6c6b9594ddfb3125dad938cd478b1f
http://git.kernel.org/stable/c/8609e29611befc4bfbe7a91bb50fc65ae72ff549
http://git.kernel.org/stable/c/8ee065a7a9b6a3976c16340503677efc4d8351f6
http://git.kernel.org/stable/c/979b418b96e35f07136f77962ccfaa54cf3e30e1
http://git.kernel.org/stable/c/5e7c402892e189a7bc152b125e72261154aa585d
http://git.kernel.org/stable/c/1852854ee349881efb78ccdbbb237838975902e4
http://git.kernel.org/stable/c/b19ab4b38b06aae12442b2de95ccf58b5dc53584


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability