Lucene search

K
cveLinuxCVE-2022-48775
HistoryJul 16, 2024 - 12:15 p.m.

CVE-2022-48775

2024-07-1612:15:02
CWE-401
Linux
web.nvd.nist.gov
35
vulnerability
linux kernel
drivers

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

AI Score

6.1

Confidence

High

EPSS

0

Percentile

5.0%

In the Linux kernel, the following vulnerability has been resolved:

Drivers: hv: vmbus: Fix memory leak in vmbus_add_channel_kobj

kobject_init_and_add() takes reference even when it fails.
According to the doc of kobject_init_and_add():

If this function returns an error, kobject_put() must be called to
properly clean up the memory associated with the object.

Fix memory leak by calling kobject_put().

Affected configurations

Nvd
Vulners
Node
linuxlinux_kernelRange4.154.19.231
OR
linuxlinux_kernelRange4.205.4.181
OR
linuxlinux_kernelRange5.55.10.102
OR
linuxlinux_kernelRange5.115.15.25
OR
linuxlinux_kernelRange5.165.16.11
VendorProductVersionCPE
linuxlinux_kernel*cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "Linux",
    "vendor": "Linux",
    "defaultStatus": "unaffected",
    "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
    "programFiles": [
      "drivers/hv/vmbus_drv.c"
    ],
    "versions": [
      {
        "version": "c2e5df616e1a",
        "lessThan": "417947891bd5",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "c2e5df616e1a",
        "lessThan": "fe595759c2a4",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "c2e5df616e1a",
        "lessThan": "91d8866ca552",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "c2e5df616e1a",
        "lessThan": "c377e2ba78d3",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "c2e5df616e1a",
        "lessThan": "92e25b637cd4",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "c2e5df616e1a",
        "lessThan": "8bc69f86328e",
        "status": "affected",
        "versionType": "git"
      }
    ]
  },
  {
    "product": "Linux",
    "vendor": "Linux",
    "defaultStatus": "affected",
    "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
    "programFiles": [
      "drivers/hv/vmbus_drv.c"
    ],
    "versions": [
      {
        "version": "4.15",
        "status": "affected"
      },
      {
        "version": "0",
        "lessThan": "4.15",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "4.19.231",
        "lessThanOrEqual": "4.19.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "5.4.181",
        "lessThanOrEqual": "5.4.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "5.10.102",
        "lessThanOrEqual": "5.10.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "5.15.25",
        "lessThanOrEqual": "5.15.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "5.16.11",
        "lessThanOrEqual": "5.16.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "5.17",
        "lessThanOrEqual": "*",
        "status": "unaffected",
        "versionType": "original_commit_for_fix"
      }
    ]
  }
]

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

AI Score

6.1

Confidence

High

EPSS

0

Percentile

5.0%