CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
Low
EPSS
Percentile
5.1%
In the Linux kernel, the following vulnerability has been resolved:
mISDN: Fix memory leak in dsp_pipeline_build()
dsp_pipeline_build() allocates dup pointer by kstrdup(cfg),
but then it updates dup variable by strsep(&dup, “|”).
As a result when it calls kfree(dup), the dup variable contains NULL.
Found by Linux Driver Verification project (linuxtesting.org) with SVACE.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 20.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-azure | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-bluefield | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-gcp | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-gkeop | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-ibm | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-intel-iotg-5.15 | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-iot | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-kvm | < any | UNKNOWN |
git.kernel.org/linus/c6a502c2299941c8326d029cfc8a3bc8a4607ad5 (5.17-rc8)
git.kernel.org/stable/c/640445d6fc059d4514ffea79eb4196299e0e2d0f
git.kernel.org/stable/c/7777b1f795af1bb43867375d8a776080111aae1b
git.kernel.org/stable/c/a3d5fcc6cf2ecbba5a269631092570aa285a24cb
git.kernel.org/stable/c/c6a502c2299941c8326d029cfc8a3bc8a4607ad5
launchpad.net/bugs/cve/CVE-2022-48863
nvd.nist.gov/vuln/detail/CVE-2022-48863
security-tracker.debian.org/tracker/CVE-2022-48863
www.cve.org/CVERecord?id=CVE-2022-48863